Professional Documents
Culture Documents
Preface
About This Course
Course Description
How to Use the Study Notes
Lesson 1
Installing Motherboards and Connectors
Topic 1A
Explain Cable Types and Connectors
Personal Computers
Peripheral Devices
Universal Serial Bus Cables
HDMI and DisplayPort Video Cables
Thunderbolt and Lightning Cables
SATA Hard Drive Cables
Review Activity: Cable Types and Connectors
Topic 1B
Install and Configure Motherboards
Motherboard Functions
Electrical Safety and ESD
Motherboard CPU and System Memory Connectors
Motherboard Storage Connectors
Motherboard Adapter Connectors
Motherboard Form Factors
Motherboard Headers and Power Connectors
Video Cards and Capture Cards
Sound Cards
Network Interface Cards
Review Activity: Motherboards
Topic 1C
Explain Legacy Cable Types
DVI and VGA Video Cables
Small Computer System Interface
Integrated Drive Electronics Interface
Serial Cables
Adapter Cables
Review Activity: Legacy Cable Types
Summary
Lesson 2
Installing System Devices
Topic 2A
Install and Configure Power Supplies and Cooling
Power Supply Units
Wattage Rating
Power Supply Connectors
Fan Cooling Systems
Liquid Cooling Systems
Review Activity: Power Supplies and Cooling
Topic 2B
Select and Install Storage Devices
Mass Storage Devices
Solid-State Drives
Hard Disk Drives
Redundant Array of Independent Disks
RAID 0 and RAID 1
RAID 5 and RAID 10
Removable Storage Drives
Optical Drives
Review Activity: Storage Devices
Topic 2C
Install and Configure System Memory
System RAM and Virtual Memory
RAM Types
Memory Modules
Multi-channel System Memory
ECC RAM
Review Activity: System Memory
Topic 2D
Install and Configure CPUs
CPU Architecture
CPU Features
CPU Socket Types
CPU Types and Motherboard Compatibility
Review Activity: CPUs
Summary
Lesson 3
Troubleshooting PC Hardware
Topic 3A
Apply Troubleshooting Methodology
Best Practice Methodology
Identify the Problem
Establish and Test a Theory
Establish a New Theory or Escalate
Implement a Plan of Action
Verify and Document
Review Activity: Troubleshooting Methodology
Topic 3B
Configure BIOS/UEFI
BIOS and UEFI
Boot and Device Options
Boot Passwords and Secure Boot
Trusted Platform Modules
Review Activity: BIOS/UEFI
Topic 3C
Troubleshoot Power and Disk Issues
Troubleshoot Power Issues
Troubleshoot POST Issues
Troubleshoot Boot Issues
Troubleshoot Drive Availability
Troubleshoot Drive Reliability and Performance
Troubleshoot RAID Failure
Review Activity: Power and Disk Issues
Topic 3D
Troubleshoot System and Display Issues
Troubleshoot Component Issues
Troubleshoot Performance Issues
Troubleshoot Inaccurate System Date/Time
Troubleshoot Missing Video Issues
Troubleshoot Video Quality Issues
Review Activity: System and Display Issues
Summary
Lesson 4
Comparing Local Networking Hardware
Topic 4A
Compare Network Types
LANs and WANs
SOHO and Enterprise Networks
Datacenters and Storage Area Networks
Personal Area Networks
Review Activity: Network Types
Topic 4B
Compare Networking Hardware
Network Interface Cards
Patch Panels
Hubs
Switches
Unmanaged and Managed Switches
Power over Ethernet
Review Activity: Networking Hardware
Topic 4C
Explain Network Cable Types
Unshielded Twisted Pair
Shielded Twisted Pair
Cat Standards
Copper Cabling Connectors
Copper Cabling Installation Tools
Copper Cabling Test Tools
Network Taps
Copper Cabling Installation Considerations
Optical Cabling
Coaxial Cabling
Review Activity: Network Cable Types
Topic 4D
Compare Wireless Networking Types
Access Points
802.11a and the 5 GHz Frequency Band
802.11b/g and the 2.4 GHz Frequency Band
802.11n
Wi-Fi 5 and Wi-Fi 6
Wireless LAN Installation Considerations
Wi-Fi Analyzers
Long-Range Fixed Wireless
Bluetooth, RFID, and NFC
Review Activity: Wireless Networking Types
Summary
Lesson 5
Configuring Network Addressing and Internet Connections
Topic 5A
Compare Internet Connection Types
Internet Connection Types and Modems
Digital Subscriber Line Modems
Cable Modems
Fiber to the Curb and Fiber to the Premises
Fixed Wireless Internet Access
Cellular Radio Internet Connections
Routers
Firewalls
Review Activity: Internet Connection Types
Topic 5B
Use Basic TCP/IP Concepts
TCP/IP
IPv4 Addressing
Network Prefixes
IPv4 Forwarding
Public and Private Addressing
IPv4 Host Address Configuration
Static Versus Dynamic Host Address Configuration
SOHO Router Configuration
IPv6 Addressing
Review Activity: Basic TCP/IP Concepts
Topic 5C
Compare Protocols and Ports
Protocols and Ports
Transmission Control Protocol
User Datagram Protocol
Well-Known Ports
Review Activity: Protocols and Ports
Topic 5D
Compare Network Configuration Concepts
Dynamic Host Configuration Protocol
Domain Name System
DNS Queries
DNS Record Types
DNS Spam Management Records
Virtual LANs
Virtual Private Networks
Review Activity: Network Configuration Concepts
Summary
Lesson 6
Supporting Network Services
Topic 6A
Summarize Services Provided by Networked Hosts
File/Print Servers
Web Servers
Hypertext Transfer Protocol Secure
Mail Servers
Mailbox Servers
Directory and Authentication Servers
Remote Terminal Access Servers
Network Monitoring Servers
Review Activity: Services Provided by Networked Hosts
Topic 6B
Compare Internet and Embedded Appliances
Proxy Servers
Spam Gateways and Unified Threat Management
Load Balancers
Legacy Systems
Embedded Systems and SCADA
Internet of Things Devices
Review Activity: Internet and Embedded Appliances
Topic 6C
Troubleshoot Networks
Troubleshoot Wired Connectivity
Troubleshoot Network Speed Issues
Troubleshoot Wireless Issues
Troubleshoot VoIP Issues
Troubleshoot Limited Connectivity
Review Activity: Networks
Summary
Lesson 7
Summarizing Virtualization and Cloud Concepts
Topic 7A
Summarize Client-Side Virtualization
Hypervisors
Uses for Virtualization
Virtualization Resource Requirements
Virtualization Security Requirements
Review Activity: Client-Side Virtualization
Topic 7B
Summarize Cloud Concepts
Cloud Characteristics
Common Cloud Deployment Models
Common Cloud Service Models
Desktop Virtualization
Cloud File Storage
Software-Defined Networking
Review Activity: Cloud Concepts
Summary
Lesson 8
Supporting Mobile Devices
Topic 8A
Set Up Mobile Devices and Peripherals
Mobile Display Types
Mobile Display Components
Mobile Device Accessories
Wi-Fi Networking
Cellular Data Networking
Mobile Hotspots and Tethering
Mobile Device Wired Connection Methods
Bluetooth Wireless Connections
Near-Field Communication Wireless Connections
Port Replicators and Docking Stations
Review Activity: Mobile Devices and Peripherals
Topic 8B
Configure Mobile Device Apps
Mobile Apps
Account Setup
Types of Data to Synchronize
Email Configuration Options
Synchronization Methods
Enterprise Mobility Management
Two-factor Authentication
Location Services
Review Activity: Mobile Device Apps
Topic 8C
Install and Configure Laptop Hardware
Laptop Disassembly Processes
Battery Replacement
RAM and Adapter Replacement
Disk Upgrades and Replacement
Keyboard and Security Component Replacement
Review Activity: Laptop Hardware
Topic 8D
Troubleshoot Mobile Device Issues
Power and Battery Issues
Hardware Failure Issues
Screen and Calibration Issues
Connectivity Issues
Malware Issues
Review Activity: Mobile Device Issues
Summary
Lesson 9
Supporting Print Devices
Topic 9A
Deploy Printer and Multifunction Devices
Printer Unboxing and Setup Location
Print Device Connectivity
Printer Drivers and Page Description Languages
Printer Properties
Printing Preferences
Printer Sharing
Printer Security
Scanner Configuration
Review Activity: Printer and Multifunction Devices
Topic 9B
Replace Print Device Consumables
Laser Printer Imaging Process
Laser Printer Maintenance
Inkjet Printer Imaging Process
Inkjet Printer Maintenance
Thermal Printer Maintenance
Impact Printer Maintenance
3-D Printer Maintenance
Review Activity: Print Device Consumables
Topic 9C
Troubleshoot Print Device Issues
Printer Connectivity Issues
Print Feed Issues
Print Quality Issues
Finishing Issues
Print Job Issues
Review Activity: Print Device Issues
Summary
Lesson 10
Configuring Windows
Topic 10A
Configure Windows User Settings
Windows Interfaces
Windows Settings and Control Panel
Accounts Settings
Privacy Settings
Desktop Settings
Ease of Access Settings
File Explorer
File Explorer Options and Indexing Options
Review Activity: Windows User Settings
Topic 10B
Configure Windows System Settings
System Settings
Update and Security Settings
Device Settings
Display and Sound Settings
Power Options
Apps, Programs, and Features
Apps Settings
Network Settings
Administrative Tools
Management Shortcuts
Review Activity: Windows System Settings
Summary
Lesson 11
Managing Windows
Topic 11A
Use Management Consoles
Device Manager
Disk Management Console
Disk Maintenance Tools
Task Scheduler
Local Users and Groups Console
Certificate Manager
Group Policy Editor
Registry Editor
Custom Microsoft Management Consoles
Review Activity: Management Consoles
Topic 11B
Use Performance and Troubleshooting Tools
System Information
Event Viewer
Task Manager Process Monitoring
Task Manager Performance Monitoring
Task Manager User Monitoring
Startup Processes and Services Console
Resource Monitor and Performance Monitor
Performance Counters
System Configuration Utility
Review Activity: Performance and Troubleshooting Tools
Topic 11C
Use Command-line Tools
Command Prompt
Navigation Commands
File Management Commands
Disk Management Commands
System Management Commands
Review Activity: Command-line Tools
Summary
Lesson 12
Identifying OS Types and Features
Topic 12A
Explain OS Types
Windows and macOS
UNIX, Linux, and Chrome OS
iOS and Android
Windows File System Types
Linux and macOS File System Types
OS Compatibility Issues
Vendor Life-cycle Limitations
Review Activity: OS Types
Topic 12B
Compare Windows Editions
Windows Versions
Windows Home Edition
Work and Education Features
Windows Pro and Enterprise Editions
Windows Upgrade Paths and Feature Updates
Review Activity: Windows Editions
Summary
Lesson 13
Supporting Windows
Topic 13A
Perform OS Installations and Upgrades
Installation and Upgrade Considerations
Unattended Installations
Boot Methods
Disk Configuration
Repair Installation
Review Activity: OS Installations and Upgrades
Topic 13B
Install and Configure Applications
System Requirements for Applications
OS Requirements for Applications
Distribution Methods
Other Considerations
Review Activity: Applications
Topic 13C
Troubleshoot Windows OS Problems
Boot Process
Boot Recovery Tools
System Restore
Update and Driver Roll Back
System Repair, Reinstall, and Reimage
Troubleshoot Boot Issues
Troubleshoot Profile Issues
Troubleshoot Performance Issues
Troubleshoot System Fault Issues
Troubleshoot Application and Service Fault Issues
Review Activity: Windows OS Problems
Summary
Lesson 14
Managing Windows Networking
Topic 14A
Manage Windows Networking
Windows Network Connection Types
IP Addressing Schemes
Windows Client Configuration
Network Location
Windows Defender Firewall Configuration
VPN and WWAN Connection Types
Proxy Settings
Review Activity: Windows Networking
Topic 14B
Troubleshoot Windows Networking
Troubleshoot IP Configuration
Troubleshoot Local Network Connectivity
Troubleshoot Remote Network Connectivity
Troubleshoot Name Resolution
Troubleshoot Network Ports
Review Activity: Windows Networking
Topic 14C
Configure Windows Security Settings
Logical Security Controls
User and Group Accounts
User Account Control
Authentication Methods
Windows Login Options
Windows Domains and Active Directory
Group Policy and Login Scripts
Mobile Device Management
Review Activity: Windows Security Settings
Topic 14D
Manage Windows Shares
Workgroup Setup
File Share Configuration
Network Browsing and Mapping Drives
Printer Sharing
NTFS versus Share Permissions
Permissions Inheritance
Domain Setup
Home Folders
Roaming Profiles and Folder Redirection
Review Activity: Windows Shares
Summary
Lesson 15
Managing Linux and macOS
Topic 15A
Identify Features of Linux
Shells, Terminals, and Consoles
Command Interface
Navigation Commands
Search Commands
File Management Commands
User Account Management
File Permissions Commands
Package Management Commands
Process Monitoring Commands
Network Management Commands
Backup and Scheduling Commands
Review Activity: Features of Linux
Topic 15B
Identify Features of macOS
Interface Features
System Preferences
Security and User Management
Finder and iCloud
App Installation and Management
OS and App Updates
Network and Device Settings
Time Machine Backup
Troubleshoot Crashes and Boot Issues
Review Activity: Features of macOS
Summary
Lesson 16
Configuring SOHO Network Security
Topic 16A
Explain Attacks, Threats, and Vulnerabilities
Information Security
Vulnerabilities
Social Engineering
Phishing and Evil Twins
Threat Types
Password Attacks
Cross-site Scripting Attacks
SQL Injection Attacks
Hashing and Encryption Concepts
Digital Signatures and Key Exchange
Review Activity: Attacks, Threats, and Vulnerabilities
Topic 16B
Compare Wireless Security Protocols
Wi-Fi Protected Access
Wi-Fi Authentication Methods
Enterprise Authentication Protocols
RADIUS, TACACS+, and Kerberos
Review Activity: Wireless Security Protocols
Topic 16C
Configure SOHO Router Security
Home Router Setup
Firmware Update
Home Router LAN and WLAN Configuration
Home Router Firewall Configuration
Home Router Port Forwarding Configuration
Universal Plug-and-Play
Screened Subnets
Review Activity: SOHO Router Security
Topic 16D
Summarize Security Measures
Physical Access Control
Lock Types
Alarms and Surveillance
Review Activity: Security Measures
Summary
Lesson 17
Managing Security Settings
Topic 17A
Configure Workstation Security
Password Best Practices
End User Best Practices
Account Management
Account Policies
Execution Control
Windows Defender Antivirus
Windows Defender Firewall
Encrypting File System
Windows BitLocker and BitLocker To Go
Review Activity: Workstation Security
Topic 17B
Configure Browser Security
Browser Selection and Installation
Browser Extensions and Plug-ins
Browser Settings
Secure Connections and Valid Certificates
Browser Privacy Settings
Review Activity: Browser Security
Topic 17C
Troubleshoot Workstation Security Issues
Malware Vectors
Malware Payloads
Ransomware and Cryptominers
Troubleshoot Desktop Symptoms
Troubleshoot Browser Symptoms
Best Practices for Malware Removal
Infected Systems Quarantine
Malware Removal Tools and Methods
Malware Infection Prevention
Review Activity: Workstation Security Issues
Summary
Lesson 18
Supporting Mobile Software
Topic 18A
Configure Mobile OS Security
Screen Locks
Mobile Security Software
Enterprise Mobility Management
Mobile Data Security
Locator Apps and Remote Wipe
Internet of Things Security
Review Activity: Mobile OS Security
Topic 18B
Troubleshoot Mobile OS and App Software
Mobile Device Troubleshooting Tools
Troubleshoot Device and OS Issues
Troubleshoot App Issues
Troubleshoot Connectivity Issues
Review Activity: Mobile OS and App Software
Topic 18C
Troubleshoot Mobile OS and App Security
Root Access Security Concerns
Mobile App Source Security Concerns
Mobile Security Symptoms
Review Activity: Mobile OS and App Security
Summary
Lesson 19
Using Support and Scripting Tools
Topic 19A
Use Remote Access Technologies
Remote Desktop Tools
RDP Server and Security Settings
Microsoft Remote Assistance
Secure Shell
Desktop Management and Remote Monitoring Tools
Other Remote Access Tools
Review Activity: Remote Access Technologies
Topic 19B
Implement Backup and Recovery
Backup Operations
Backup Methods
Backup Media Requirements
Backup Testing and Recovery Best Practices
Review Activity: Backup and Recovery
Topic 19C
Explain Data Handling Best Practices
Regulated Data Classification
Prohibited Content and Licensing Issues
Incident Response
Data Integrity and Preservation
Data Destruction Methods
Disposal and Recycling Outsourcing Concepts
Review Activity: Data Handling Best Practices
Topic 19D
Identify Basics of Scripting
Shell Scripts
Basic Script Constructs
Windows Scripts
JavaScript and Python
Use Cases for Scripting
Scripting Best Practices and Considerations
Review Activity: Basics of Scripting
Summary
Lesson 20
Implementing Operational Procedures
Topic 20A
Implement Best Practice Documentation
Standard Operating Procedure
Ticketing Systems
Ticket Management
Asset Identification and Inventory
Asset Documentation
Change Management Concepts
Change Approval
Policy Documentation
Review Activity: Best Practice Documentation
Topic 20B
Use Proper Communication Techniques
Professional Support Processes
Professional Support Delivery
Professional Appearance
Professional Communications
Difficult Situations
Review Activity: Proper Communication Techniques
Topic 20C
Use Common Safety and Environmental Procedures
Compliance with Regulations
Electrical Safety
Other Safety Hazard Mitigations
Environmental Impacts
Electrostatic Discharge Mitigation
Building Power Issues and Mitigations
Materials Handling and Responsible Disposal
Review Activity: Safety and Environmental Procedures
Summary
Appendix A
Mapping Course Content to CompTIA® A+® Core 1 (Exam 220-
1101)
Appendix B
Mapping Course Content to CompTIA® A+® Core 2 (Exam 220-
1102)
Glossary
Glossary
Solutions
Review Activity: Cable Types and Connectors
Review Activity: Motherboards
Review Activity: Legacy Cable Types
Review Activity: Power Supplies and Cooling
Review Activity: Storage Devices
Review Activity: System Memory
Review Activity: CPUs
Review Activity: Troubleshooting Methodology
Review Activity: BIOS/UEFI
Review Activity: Power and Disk Issues
Review Activity: System and Display Issues
Review Activity: Network Types
Review Activity: Networking Hardware
Review Activity: Network Cable Types
Review Activity: Wireless Networking Types
Review Activity: Internet Connection Types
Review Activity: Basic TCP/IP Concepts
Review Activity: Protocols and Ports
Review Activity: Network Configuration Concepts
Review Activity: Services Provided by Networked Hosts
Review Activity: Internet and Embedded Appliances
Review Activity: Networks
Review Activity: Client-Side Virtualization
Review Activity: Cloud Concepts
Review Activity: Mobile Devices and Peripherals
Review Activity: Mobile Device Apps
Review Activity: Laptop Hardware
Review Activity: Mobile Device Issues
Review Activity: Printer and Multifunction Devices
Review Activity: Print Device Consumables
Review Activity: Print Device Issues
Review Activity: Windows User Settings
Review Activity: Windows System Settings
Review Activity: Management Consoles
Review Activity: Performance and Troubleshooting Tools
Review Activity: Command-line Tools
Review Activity: OS Types
Review Activity: Windows Editions
Review Activity: OS Installations and Upgrades
Review Activity: Applications
Review Activity: Windows OS Problems
Review Activity: Windows Networking
Review Activity: Windows Networking
Review Activity: Windows Security Settings
Review Activity: Windows Shares
Review Activity: Features of Linux
Review Activity: Features of macOS
Review Activity: Attacks, Threats, and Vulnerabilities
Review Activity: Wireless Security Protocols
Review Activity: SOHO Router Security
Review Activity: Security Measures
Review Activity: Workstation Security
Review Activity: Browser Security
Review Activity: Workstation Security Issues
Review Activity: Mobile OS Security
Review Activity: Mobile OS and App Software
Review Activity: Mobile OS and App Security
Review Activity: Remote Access Technologies
Review Activity: Backup and Recovery
Review Activity: Data Handling Best Practices
Review Activity: Basics of Scripting
Review Activity: Best Practice Documentation
Review Activity: Proper Communication Techniques
Review Activity: Safety and Environmental Procedures
COURSE EDITION: 1.0
ACKNOWLEDGMENTS
NOTICES
Disclaimer
While CompTIA, Inc. takes care to ensure the accuracy and quality
of these materials, we cannot guarantee their accuracy, and all
materials are provided without any warranty whatsoever,
including, but not limited to, the implied warranties of
merchantability or fitness for a particular purpose. The use of
screenshots, photographs of another entity’s products, or another
entity’s product name or service in this book is for editorial
purposes only. No such use should be construed to imply
sponsorship or endorsement of the book by nor any affiliation of
such entity with CompTIA. This courseware may contain links to
sites on the Internet that are owned and operated by third parties
(the “External Sites”). CompTIA is not responsible for the availability
of, or the content located on or through, any External Site. Please
contact CompTIA if you have any concerns regarding such links or
External Sites.
Trademark Notice
Copyright Notice
Course Objectives
This course can benefit you in two ways. If you intend to pass the
CompTIA A+ Core 1 and Core 2 (Exams 220-1101 and 220-1102)
certification examination, this course can be a significant part of
your preparation. But certification is not the only key to
professional success in the field of IT support. Today’s job market
demands individuals with demonstrable skills, and the information
and activities in this course can help you build your skill set so that
you can confidently perform your duties in any entry-level PC
support role.
The Official CompTIA A+ Core 1 and Core 2 (Exams 220-1101 and 220-
1102) is the primary course you will need to take if your job
responsibilities include supporting the use of PCs, mobile devices,
and printers within a corporate or small office home office (SOHO)
network. You can take this course to prepare for the CompTIA A+
Core 1 and Core 2 (Exams 220-1101 and 220-1102) certification
examination.
Prerequisites
The following notes will help you understand how the course
structure and components are designed to support mastery of the
competencies and tasks associated with the target job roles and
will help you prepare to take the certification exam.
As You Learn
As You Review
Following the lesson content, you will find a table mapping the
lessons and topics to the exam domains, objectives, and content
examples. You can use this as a checklist as you prepare to take
the exam, and review any content that you are uncertain about.
As a Reference
Installing Motherboards
and Connectors
LESSON INTRODUCTION
LESSON OBJECTIVES
The rear panel provides access to the power supply unit (PSU)
sockets. The PSU has an integral fan exhaust. Care should be taken
that it is not obstructed, as this will adversely affect cooling. There
may be an additional case fan.
Features on the rear panel of a typical PC case. (Image © 123RF.com)
At the bottom of the rear panel there are cutout slots aligned with
the position of adapter card slots to allow cables to be connected
to any I/O ports on the cards. These slots should either be covered
by an adapter card or a metal strip known as a blanking plate.
Uncovered slots can disrupt the proper flow of air around
components in the PC and cause overheating and increase the
amount of dust in the system.
PERIPHERAL DEVICES
A peripheral cable for the Universal Serial Bus (USB) interface with different connector types
being used to connect a portable hard drive and a desktop computer. (Image © 123RF.com)
USB port symbol. Variations on this basic icon identify supported features, such as higher
transfer rates and power delivery. Wikimedia Commons
(commons.wikimedia.org/wiki/File:USB_icon.png)
USB Standards
Legacy
Standard Speed Connectors
Designation
In USB 3, there are new versions of the Type A, Type B, and Type B
Micro connectors with additional signaling pins and wires. USB 3
receptacles and connectors often have a blue connector tab or
housing to distinguish them. USB 3 Type A connections are
physically compatible with USB 1.1 and 2.0 connections, but the
Type B/Type B Micro connections are not. So, for example, you
could plug a USB 2 Type A cable into a USB 3 Type A port, but you
could not plug a USB 3 Type B cable into a USB 2 Type B port.
USB 3 connectors and ports (from left to right): Type A, Type B, Micro Type B, Type C. (Image
©123RF.com)
USB 3.1 defines the USB-C connector type. This compact form
factor is intended to provide a single, consistent hardware
interface for the standard. The connector is reversible, meaning it
can be inserted either way up. The connector design is also more
robust than the earlier miniB and microB types. USB-C can use the
same type of connector at both ends, or you can obtain USB-C to
USB Type A or Type B converter cables.
Cable Length
Power
As well as a data signal, the bus can supply power to the connected
device. Most USB Type A and Type C ports can be used to charge
the battery in a connected device.
The USB interface supports many types of devices, but it has not
traditionally been used for video. As video has high bandwidth
demands, it is typically provisioned over a dedicated interface.
There are full-size (Type A), mini (Type C), and micro (Type D)
connectors, all of which are beveled to ensure correct orientation.
HDMI connector and port on the left and mini-HDMI connector and port on the right. (Image
©123RF.com)
HDMI cable is rated as either Standard (Category 1) or High Speed
(Category 2). High Speed cable supports greater lengths and is
required for v1.4 features, such as 4K and refresh rates over 60 Hz.
HDMI versions 2.0 and 2.1 specify Premium High Speed (up to 18
Gbps) and Ultra High Speed (up to 48 Gbps) cable ratings.
DisplayPort Interface
Thunderbolt Interface
Lightning Interface
SATA connectors and ports (from left to right): SATA data, SATA power (with 3.3V orange wire).
(Image ©123RF.com)
The 7-pin data connector does not supply power. A separate 15-pin
SATA power connector is used to connect the device to the PC’s
power supply.
Internal storage device data cables are unpowered. While the SATA
power connector is the best option for new devices, legacy
components connect to the power supply unit (PSU) via a Molex
connector . A Molex connector is usually white or clear plastic and
has 4 pins. The color coding of the wire insulation represents the
DC voltage: red (5 VDC), yellow (12 VDC), and black (ground).
A Molex connector. (Image © 123RF.com)
External SATA
(Image ©123RF.com)
All computer software and data are processed by using the ones
and zeroes of binary code. Software works by running instructions
in the central processing unit (CPU). This can be referred to as the
compute or processing function of a PC.
Instructions and data also require storage. The CPU can only store
a limited number of instructions internally at any one time.
Additional storage for running programs and open data files is
provided through system memory. This random-access memory
(RAM) storage technology is nonpersistent. Nonpersistent means
that the RAM devices can only hold data when the PC is powered
on. Mass storage devices are used to preserve data when the
computer is turned off.
CPU, cache, and RAM are fast but volatile. Mass storage and removable storage devices
provide slower but permanent data retrieval. (Image ©123RF.com)
Electrical Safety
When working with a PC, you must ensure your own safety. This
means that the PC must be disconnected from the power supply
before opening the case. Additionally, hold the power button for a
few seconds after disconnecting the power cord to ensure that all
internal components are drained of charge. Do not attempt to
disassemble components that are not field repairable, such as the
power supply.
Electrostatic Discharge
You need to use tools and procedures that minimize the risk of
damage to the sensitive electronic components used inside the PC.
Components such as the CPU, system RAM, adapter cards, and the
motherboard itself are vulnerable to electrostatic discharge (ESD).
This is where a static charge stored on your clothes or body is
suddenly released into a circuit by touching it. Handle components
by their edges or plastic parts, and ideally, use an anti-ESD wrist
strap and other protective equipment and procedures.
ESD wrist strap on ESD mat. (Image by Audrius Merfeldas © 123RF.com)
CPU Sockets
M.2 Interface
2 5 0.5 8
3 8 0.985 15.754
4 16 1.969 31.508
5 32 3.938 63.015
Adapter slots with more lanes are physically longer. Each PCIe
adapter card supports a specific number of lanes, typically x1, x4,
x8, or x16. Ideally, the card should be plugged into a port that
supports the same number of lanes. However, if insufficient slots
are available, a card will fit in any port with an equal or greater
number of lanes. This is referred to as up-plugging. For example, a
x8 card will fit in a x8 or x16 socket. The card should work at x8 but
in some circumstances may only work at x1.
The motherboard form factor describes its shape, layout, and the
type of case and power supply that can be used, plus the number
of adapter cards that can be installed.
Small form factor (SFF) PCs are popular as home machines and for
use as mini servers. SFF PCs often use Via’s Mini-ITX ( Information
Technology Extended ) form factor.
Motherboard Installation
2. Orient the board to the oblong I/O cut out at the rear of the
case. Prepare the motherboard I/O blanking plate in the
correct orientation by removing caps so that USB, audio, and
video ports will be uncovered when the board is fitted. Fit the
blanking plate to the case by snapping it into the cut out.
3. Insert standoffs into the case to match the hole locations on
the motherboard. Standoffs are usually threaded, though
older cases might use push-down pegs. There might be a
guide standoff attached to the case or all standoffs might
come preinstalled. Make sure that corners, long edges, and
the center of the board will be supported. Do not add
standoffs where there is no corresponding hole on the
motherboard.
4. Optionally, add the CPU and memory modules to the
motherboard before installing the board in the case.
5. Check the alignment and standoff location again and verify
that each standoff is secure. If everything is correct, place the
motherboard on the standoffs.
Align the board with the I/O cut out (top left) and ensure that it is supported by standoffs at the
edges and in the center. (Image courtesy of CompTIA.)
Headers
Power Connectors
Video Cards
The video card (or graphics adapter) generates the signal to drive
a monitor or projector. Low-end graphics adapters are likely to be
included with the motherboard chipset or as part of the CPU itself.
This is also referred to as an onboard adapter or onboard graphics.
If a computer is to be used for 3-D gaming, computer-aided design
(CAD), or digital artwork, a more powerful video adapter is
required. This can be installed as an add-on card via a PCIe slot.
Most graphics adapters are based on chipsets by ATI/AMD, NVIDIA,
and Intel. Video cards are distinguished by the following features:
Most modern cards use a PCIe x16 interface. The slot typically has
a retaining latch at the end to hold the card securely in place. Dual
cards, using two (or more) slots, are also available.
A video/graphics card with DisplayPort, HDMI, and DVI-I ports. (Image ©123RF.com)
Capture Cards
(Image ©123RF.com)
The HDMI and DisplayPort video interfaces only support digital flat-
panel displays. Older video interfaces were used when computer
monitors and projectors were predominantly of the cathode ray
tube (CRT) type, driven by an analog signal.
The 15-pin Video Graphics Array (VGA) port was the standard
analog video interface for PC devices for a very long time. Up until
a few years ago, most video cards and monitors included a VGA
port, though it is starting to be phased out completely now. VGA
will usually support resolutions up to HD (1920x1080), depending
on cable quality. The connector is a D-shell type with screws to
secure it to the port.
EIDE cable with device 0 (black), device 1 (grey), and motherboard (blue) connectors. The red
strip indicates pin 1 on the cable. (Image ©123RF.com)
Unfortunately, the terms master and slave were used to
distinguish device 0 and device 1. CompTIA and the
computing industry generally are working to eliminate this
type of non-inclusive terminology, but you will often still see
it used in historical support documentation.
SERIAL CABLES
You might also come across PS/2 serial ports. PS/2 i used to
attach mice and keyboards. PS/2 ports use a 6-pin mini-DIN
format. The green color-coded port is used to attach a
mouse, and the purple one is for a keyboard.
ADAPTER CABLES
Given the numerous cable types and connector types, it will often
be the case that a basic peripheral cable will not provide a
connection between a port available on the PC and the port used
on the peripheral device. An adapter cable can often be used to
overcome this issue. An adapter cable has connectors for two
different cable types at each end. An active adapter uses circuitry
to convert the signal, while a passive adapter simply converts
between two connector form factors.
Summary
You should be able to identify and install types of interfaces and
their physical connectors on the motherboard and on peripheral
devices.
LESSON INTRODUCTION
LESSON OBJECTIVES
The power supply unit (PSU) delivers direct current (DC) low voltage
power to the PC components. A PSU contains a rectifier to convert
alternating current (AC ) building power to DC voltage output,
transformers to step down to lower voltages, and filters and
regulators to ensure consistent output voltage levels. The other
important component in the PSU is the fan, which dissipates the
heat generated.
The power supply’s size and shape determine its compatibility with
the system case, in terms of available room plus screw and fan
locations. The form factor also determines compatibility with the
motherboard, in terms of power connectors. Most PSUs designed
for use with desktop PCs are based on the ATX form factor.
The power output is not the same as the power the PSU
draws from grid power. If a PSU works at around 75%
efficiency, a 300 W supply would draw 400 W from the
outlet. The extra energy is lost mainly as heat. As energy
becomes more expensive both in terms of cost and in terms
of the climate, power efficiency is an important criterion to
use when selecting a PSU. An ENERGY STAR 80 PLUS
compliant PSU must be 80% efficient at 20–100% of load.
+3.3 20 130
+5 20 130
+12 33 396
A computer system may be fitted with two PSUs, with one acting as
a failover redundant power supply . This could also be connected
to a different grid power circuit. A redundant PSU configuration
requires a compatible motherboard. This configuration is more
commonly found on server systems than on desktop PCs. On a
server, typically each PSU plugs into a backplane and is hot-
swappable. This allows a faulty unit to be removed and replaced
without having to open the case and without the server ever losing
power.
FAN COOLING SYSTEMS
There are various mechanisms for clamping a CPU heat sink to the
motherboard. There may be a retaining clip or push pins. Push pins
can be released and reset for insertion by making a half turn with a
screwdriver.
Fans
Many PCs have components that generate more heat than can be
removed by passive cooling. A fan improves airflow, which helps to
dissipate heat. Fans are used for the power supply and chassis
exhaust points. The fan system will be designed to draw cool air
from the low vents in the front of the case over the motherboard
and expel warmed air from the fan positioned at the top of the
back of the case. Most heat sinks are fitted with fans to improve
their cooling performance. The fan’s power connector must be
plugged into a motherboard fan power port.
Thermometer sensors are used at each fan location to set an
appropriate speed and to detect whether a fan has failed.
Both fans and heat sinks become less effective if dust is allowed to
build up. These components and any air vents should be cleaned
periodically, either manually with a soft brush and/or compressed
air or using a vacuum cleaner approved for use with PCs.
LIQUID COOLING SYSTEMS
PCs used for high-end gaming may generate more heat than basic
thermal management can cope with. PCs used where the ambient
temperature is very high may also require exceptional cooling
measures.
● The water loop/tubing and pump push the coolant added via
the reservoir around the system.
● Water blocks and brackets are attached to each device to
remove heat by convection. These are attached in a similar
way to heat sink/fan assemblies and then connected to the
water loop.
● Radiators and fans are positioned at air vents to dispel the
excess heat.
3. One of the PCs has a faulty CPU, and one has a faulty
power supply. You can use the CPU from one machine in
the other. You have opened the case and taken antistatic
precautions. What steps must you perform to access the
CPU?
A PC is often much less valuable than the data that it stores and
processes. This means that the reliability and performance of the
devices used to store system files and user files is of critical
importance. If these storage devices fail, the PC will not work, and
valuable information may be lost. By identifying the types and
characteristics of storage devices, you will be prepared to select,
install, and maintain them to ensure a reliable computing
environment for users.
MASS STORAGE DEVICES
Computer tower with main panel removed showing an attached motherboard and areas for
optical disc drives, 3.5-inch drive bays, and a power supply bay. (Image ©123RF.com)
Removable mass storage devices and removable media allow data
to be archived from the PC and transferred between PCs. External
storage devices are also used for backup and data transfer or to
provide a drive type not available as an internal unit. A device such
as an external hard drive would typically be connected to the
computer via a USB or Thunderbolt port.
Apart from cost, several factors impact the choice of mass storage
device:
A 2.5-inch form factor solid state drive with SATA interface. (Image ©123RF.com)
Consequently, modern SSDs often use the PCI Express (PCIe) bus
directly. Where SATA uses the advanced host controller interface
(AHCI) logical interface to communicate with the bus, PCIe-based
SSDs use the non-volatile memory host controller interface
specification (NVMHCI) or NVM Express (NVMe) .
M.2 is a physical form factor. You can obtain M.2 SSDs that
use the SATA/AHCI bus. These will typically not perform as
well as NVMe-based M.2 SSDs. On the motherboard, an M.2
socket may be able to support both types of drive or only
one; check the documentation. SATA interface SSDs are
usually B keyed, 2-lane PCIe SSDs are usually B/M keyed,
and 4-lane SSDs are usually M keyed.
A hard disk drive (HDD) stores data on metal or glass platters that
are coated with a magnetic substance. The top and bottom of each
platter is accessed by its own read/write head, moved by an
actuator mechanism. The platters are mounted on a spindle and
spun at high speed. Each side of each platter is divided into circular
tracks, and a track contains several sectors, each with a capacity of
512 bytes. This low-level formatting is also referred to as the drive
geometry.
HDD with drive circuitry and casing removed showing 1) Platters; 2) Spindle; 3) Read/Write
Heads; 4) Actuator. (Image by mkphotoshu @123RF.com)
The internal transfer rate (or data or disk transfer rate) of a drive is
a measure of how fast read/write operations are performed on the
disk platters. A 15 K drive should support an internal transfer rate
of up to about 180 MBps, while 7.2 K drives will be around 110
MBps.
Most HDDs use a SATA interface, though you may come across
legacy devices using EIDE/PATA or SCSI interfaces. There are two
main form factors for HDDs. The mainstream type used in
desktop PCs are 3.5-inch units. The 2.5 -inch form factor is used for
laptops and as portable external drives. Devices with 2.5-inch form
factors can also vary in height, with 15 mm, 9.5 mm, 7 mm, and 5
mm form factors available.
REDUNDANT ARRAY OF
INDEPENDENT DISKS
Disk striping divides data into blocks and spreads the blocks in a
fixed order among all the disks in the array. This improves
performance as multiple disks are available to service requests in
parallel. RAID 0 requires at least two disks. The logical volume size
is the combined total of the smallest capacity physical disk in the
array.
RAID 1 (Mirroring)
RAID 10—Either disk in each of the sub-volumes can fail without bringing down the main
volume. (Image ©123RF.com)
Drive Enclosures
USB thumb drive (left) and SD memory card (right). (Image ©123RF.com)
These discs can also be used as storage media for PC data. Each
disc type is available in recordable and rewritable formats:
Each optical disc type has different capacity and transfer rate:
Address Space
The DIMM’s DDR type must match the motherboard. You cannot
install DDR5 modules in DDR4 slots, for instance. For best
performance, the modules should be rated at the same bus speed
as the motherboard. It is possible to add modules that are faster or
slower than the motherboard slots or mix modules of different
speeds. However, the system will operate only at a speed that is
supported by all installed components (memory modules and
controller), so this is not generally a good idea.
Intel uses land grid array (LGA) socket form factor CPUs. The LGA
form factor positions the pins that connect the CPU on the socket.
The CPU is placed on a hinged plate and then secured to the socket
using a locking lever.
GIGA-BYTE Z590 Gaming motherboard with IntelSocket 1200 LGA form factor CPU socket.
(Image used with permission from Gigabyte Technology.)
AMD uses pin grid array (PGA) form factor chips predominantly.
The PGA form factor positions the pins on the underside of the
processor package. The CPU is placed gently into the socket and
then secured using a locking lever. Care must be taken to orient
pin 1 on the CPU correctly with pin 1 on the socket so as not to
bend or break any of the pins.
GIGA-BYTE X570S Gaming X motherboard with AMD Socket AM4 PGA form factor CPU socket.
(Image used with permission from Gigabyte Technology.)
When removing a CPU with a heat sink and fan assembly, use a
gentle twist to remove the heat sink to avoid it sticking to the CPU.
Release the latch securing the CPU before attempting to remove it.
If reinstalling the same heat sink, clean old thermal grease from
the surfaces and apply a small amount of new grease in an X
pattern. Do not apply too much—if it overruns, the excess could
damage the socket.
CPU TYPES AND
MOTHERBOARD
COMPATIBILITY
The nature of the current CPU market means that there is rapid
turnover of models. Each vendor releases a CPU design with a
number of architectural improvements and quite often with a new
socket design. This is referred to as a CPU’s generation. In each
generation, the manufacturer releases several models.
Desktops
Current Intel desktop socket designs include LGA 2011, LGA 1151,
LGA 2066, LGA 1200, and LGA 1700. Most current AMD CPUs use
the PGA form factor socket AM4.
Workstations
Servers
Intel’s recent Xeon models use LGA 1150, LGA 1151, and LGA 2011
sockets. AMD’s Epyc CPU uses the LGA Socket SP3 form factor.
Mobiles
Summary
You should be able to install power supplies, cooling systems,
storage devices, system memory, and CPUs.
Troubleshooting PC
Hardware
LESSON INTRODUCTION
Along with best practices, you also need to build knowledge of and
experience with the common symptoms that affect PC system
components and peripheral devices.
LESSON OBJECTIVES
Apply Troubleshooting
Methodology
Conduct Research
If your theory is not proven by the tests you make or the research
you undertake, you must establish a new theory. If one does not
suggest itself from what you have discovered so far, there may be
more lengthy procedures you can use to diagnose a cause.
Remember to assess business needs before embarking on very
lengthy and possibly disruptive tests. Is there a simpler
workaround that you are overlooking?
When you have a reliable theory of probable cause, you then need
to determine the next steps to solve the problem.
When you apply a solution, test that it fixes the reported problem
and that the system as a whole continues to function normally.
Tests could involve any of the following:
Configure BIOS/UEFI
For many years, the system firmware for a PC was a type called the
Basic Input/Output System (BIOS) . BIOS only supports 32-bit
operation and limited functionality. Newer motherboards may use
a different kind of firmware called Unified Extensible Firmware
Interface (UEFI) . UEFI provides support for 64-bit CPU operation
at boot, a full GUI and mouse operation at boot, networking
functionality at boot, and better boot security. A computer with
UEFI may also support booting in a legacy BIOS mode.
A UEFI setup program. (Screenshot used with permission from ASUSTek Computer Inc.)
BOOT AND DEVICE OPTIONS
Boot parameters.
USB Permissions
Fan Considerations
The setup program will also report the current temperature of the
probes located near each fan connector.
There are many third-party utilities that can access these
settings and monitors from within the OS.
BOOT PASSWORDS AND
SECURE BOOT
The TPM can be enabled or disabled and reset via the system setup
program, though it is also possible to manage it from the OS as
well.
Configuring a TPM.
Problems with disks and storage systems can have impacts beyond
just booting the computer. End users rely on the storage devices in
their PCs to store important system information and personal or
professional data and files. Without a storage device that works
properly, the computer system is essentially worthless. As a
CompTIA A+ technician, you will likely be called upon to fix or
troubleshoot common problems with HDDs, SSDs, and other
storage devices.
TROUBLESHOOT POWER ISSUES
Technician working with a power supply tester. (Image by Konstantin Malkov @123RF.com)
If you still cannot identify the fault, then the problem is likely to be
a faulty motherboard or power supply. If you suspect that a power
supply is faulty, do not leave it turned on for longer than necessary
and do not leave it unattended. Keep an eye out for external signs
of a problem (for example, smoke or fire). Turn off immediately if
there are any unusual sights, smells, or noises.
TROUBLESHOOT POST ISSUES
Once the CPU has been given the power good signal, the system
firmware performs a power-on self-test (POST) . The POST is a
diagnostic program implemented in the system firmware that
checks the hardware to ensure the components required to boot
the PC are present and functioning correctly.
The codes for the original IBM PC are listed in this table.
Code Meaning
Once the POST tests are complete, the firmware searches for
devices as specified in the boot sequence. If the first device in the
sequence is not found, the system attempts to boot from the next
device. For example, if there is no fixed disk, the boot sequence
checks for a USB-attached drive. If no disk-based boot device is
found, the system might attempt to boot from the network. If no
boot device is found, the system displays an error message and
halts the boot process.
● Check that data cables are not damaged and that they are
correctly connected to the drive.
● If the drives are connected to a motherboard port, check that
it has not been disabled by a jumper or via system setup.
If you can rule out issues with power and cabling, suspect an issue
with the device’s boot sector and files. Corruption due to faults in
the disk unit, power failure, incorrect installation of multiple
operating systems, or malware will prevent the disk from working
as a boot device. There are two ways of formatting the boot
information: MBR and GPT.
If you don’t have the option of using a recovery disk created by the
antivirus software, you can try to use the repair options that come
with the OS setup disk.
Blue screen of death (BSOD) preventing a Windows PC from booting. (Screenshot courtesy of
Microsoft.)
You can also use Windows utilities to query SMART and run manual
tests.
Viewing SMART information via the SpeedFan utility. (Screenshot courtesy of Microsoft.)
These tests can detect whether there is any damage to the device’s
storage mechanisms. In the case of performance, they can report
statistics such as input/output operations per second (IOPS) . If
performance is reduced from the vendor’s baseline measurements
under test conditions, it is likely that the device itself is faulty. If
performance metrics are similar to the device’s benchmark under
test conditions, any slow read/write access observed during
operation is likely to be due to a more complex system
performance issue. Possible causes include application load and
general system resource issues, file fragmentation (on hard disks),
and limited remaining capacity.
There are two main scenarios for RAID failure: failure of a device
within the array and failure of the whole array or volume.
Most desktop-level RAID solutions can tolerate the loss of only one
disk, so it should be replaced as soon as possible. If the array
supports hot swapping, then the new disk can simply be inserted
into the chassis of the computer or into a disk chassis. Once this is
done, the array can be rebuilt using the RAID configuration utility (if
a hardware RAID controller is used) or an OS utility (if you are using
software RAID). Note that the rebuilding process is likely to severely
affect performance as the controller is probably writing multiple
gigabytes of data to the new disk.
RAID errors using the configuration utility. This volume is missing one of its disks.
If the failure affects the boot process, use the RAID configuration
utility to verify its status. If you cannot access the configuration
utility, then the controller itself is likely to have failed.
Boot message indicating a problem with the RAID volume. Press Ctrl+C to start the utility and
troubleshoot.
Review Activity: Power and
Disk Issues
3. You are trying to install Windows from the setup disc, but
the computer will not boot from the DVD. What should
you do?
Overheating
If a peripheral device does not work, examine the port and the end
of the cable closely for bent, broken, or dirty pins and connectors.
Examine the length of the cable for damage.
The real time clock (RTC) is a part of the chipset that keeps track of
the calendar date and time. This component runs on battery power
when the computer is turned off. The RTC battery is a coin cell
lithium battery.
You may also need to use controls on the monitor itself to adjust
the image or select the appropriate data source or input channel.
For example, if there is no image on the screen, check that the
monitor is set to use the HDMI port that the computer is connected
to, rather than an empty DVI port. These o n-screen display (OSD)
menus are operated using buttons on the monitor case. As well as
input control, you can usually find settings for brightness,
color/contrast, and power saving.
If the display is powered on and you can rule out a problem with
the input source, check the cable and connectors between the
video card and monitor. Make sure the cable is connected securely
at both ends and is not loose. Make sure that the cable has not
become stretched or crimped. Verify that the cable specification is
valid for the application. For example, a basic HDMI cable might
not be sufficient quality for 4K resolution, which requires High
Speed rated cable.
Summary
You should be able to apply the CompTIA A+ troubleshooting
model to common scenarios and diagnose symptoms such as no
power, POST error, boot device failure, storage device/RAID issue,
or display device issue.
Comparing Local
Networking Hardware
LESSON INTRODUCTION
LESSON OBJECTIVES
A network type categorizes the area over which the parts of the
network are managed. Being able to use the correct terminology to
classify the scope of a network and distinguish their specific
requirements will enable you to assist with installation and support
procedures.
LANS AND WANS
Wireless LANs
Compare Networking
Hardware
The other side of the patch panel has prewired RJ45 ports. A patch
cord is used to connect a port on the patch panel to a port on an
Ethernet switch. This cabling design makes it easier to change how
any given wall port location is connected to the network via switch
ports.
Patch panel with prewired RJ45 ports. (Image by Svetlana Kurochkina © 123RF.com.)
It is vital to use an effective labeling system when installing
structured cabling so that you know which patch panel port
is connected to which wall port.
HUBS
Using a hub to implement an Ethernet. Node A transmits a signal, which is received by the hub
and forwarded out of each other port for reception by all the other nodes. (Image ©
123RF.com.)
Each computer will ignore any frames that do not match its MAC
address. However, when lots of computers are in the same
collision domain, performance is reduced, as only one computer
can send a frame at any one time. If two computers try to send at
the same time, there is a collision, and they must wait for a random
period before trying again. The more computers there are, the
more collisions. The computers contend for a share of the media
bandwidth and all communications are half-duplex. Half-duplex
means that the computer can send or receive, but not at the same
time.
● Screened cable has one thin outer foil shield around all pairs.
Screened cable is usually designated as screened twisted pair
(ScTP) or foiled/unshielded twisted pair (F/UTP), or sometimes
just foiled twisted pair (FTP).
● Fully shielded cabling has a braided outer screen and foil-
shielded pairs and is referred to as “shielded/foiled twisted
pair” (S/FTP). There are also variants with a foil outer shield
(F/FTP).
F/UTP cable with a foil screen surrounding unshielded pairs. (Image by Baran Ivo and released
to public domain.)
Ethernet Standard
Cat Max. Transfer Rate Max. Distance
Support
100BASE-TX (Fast
5 100 Mbps 100 m (328 ft)
Ethernet)
1000BASE-T (Gigabit
5e 1 Gbps 100 m (328 ft)
Ethernet)
1000BASE-T (Gigabit
1 Gbps 100 m (328 ft)
Ethernet)
6
10GBASE-T (10G
10 GBps 55 m (180 ft)
Ethernet)
10GBASE-T (10G
6A 10 GBps 100 m (328 ft)
Ethernet)
The Cat specification is printed on the cable jacket along with the
cable type (UTP or F/UTP, for instance). Cat 5 cable supports the
older 100 Mbps Fast Ethernet standard. It is no longer
commercially available. A network cabled with Cat 5 will probably
need to be rewired to support Gigabit Ethernet.
Cat 6A supports 10 Gbps over 100 m, but the cable is bulkier and
heavier than Cat 5e and Cat 6, and the installation requirements
more stringent, so fitting it within pathways designed for older
cable can be problematic. TIA/EIA standards recommend Cat 6A for
healthcare facilities, with Power over Ethernet (PoE) 802.3bt
installations, and for running distribution system cable to wireless
access points.
COPPER CABLING
CONNECTORS
Most Cat 6 and all Cat 6A cable has a plastic star filler running
through it that keeps the pairs separated. You need to use
electrician’s scissors (snips) to cut off the end of this before
terminating the cable. There will also be a nylon thread called a
“ripcord.” This can be pulled down the jacket to open it up more if
you damaged any of the wire pairs initially. Snip any excess ripcord
before terminating the cable.
Punchdown Tool
Connecting UTP cable to IDCs using a punchdown tool. (Image by dero2084 © 123RF.com.)
Crimper
Once you have terminated cable, you must test it to ensure that
each wire makes a good electrical contact and is in the correct pin
position. The best time to verify wiring installation and termination
is just after you have made all the connections. This means you
should still have access to the cable runs. Identifying and correcting
errors at this point will be much simpler than when you are trying
to set up end user devices.
Cable Tester
Toner Probe
Loopback Plug
Plenum Cable
Fiber optic cables fall into two broad categories: single-mode and
multi-mode:
Patch cord with duplex SC format connectors (left) and LC connectors (right). (Image by
YANAWUT SUNTORNKIJ © 123RF.com.)
Patch cords for fiber optic can come with the same connector on
each end (ST-ST, for instance) or a mix of connectors (ST-SC, for
instance). Fiber optic connectors are quite easy to damage and
should not be repeatedly plugged in and unplugged. Unused ports
and connectors should be covered by a dust cap to minimize the
risk of contamination.
COAXIAL CABLING
Coax is now mostly used for CCTV installations and as patch cable
for Cable Access TV (CATV) and broadband cable modem s. Coax
for CATV installations is typically terminated using a screw-down F-
type connector .
Compare Wireless
Networking Types
Frequency Bands
The nominal indoor range for Wi-Fi over 2.4 GHz is 45 m (150 feet)
and 30 m (100 feet) over 5 GHz. Depending on the wireless
standard used, building features that may block the signal, and
interference from other radio sources, clients are only likely to
connect at full speed from a third to a half of those distances.
The IEEE 802.11a standard uses the 5 GHz frequency band only.
The data encoding method allows a maximum data rate of 54
Mbps. The 5 GHz band is subdivided into 23 non-overlapping
channels, each of which is 20 MHz wide.
Unlicensed National Information Infrastructure (U-NII) sub-bands form the 20 MHz channels
used in the 5 GHz frequency band. Each sub-band is 5 MHz wide, so the Wi-Fi channels are
spaced in intervals of four to allow 20 MHz bandwidth. Channels within the DFS range will be
disabled if the access point detects radar signals.
802.11B/G AND THE 2.4 GHZ
FREQUENCY BAND
The IEEE 802.11b standard uses the 2.4 GHz frequency band and
was released in parallel with 802.11a. The signal encoding methods
used by 802.11b are inferior to 802.11a and support a nominal
data rate of just 11 Mbps.
802.11n 40 MHz bonded channel options in the 5 GHz band. The center channel number is
used to identify each bonded channel.
The nominal data rate for 802.11n is 72 Mbps per stream or 150
Mbps per stream for a 40 MHz bonded channel, and 802.11n
access points are marketed using Nxxx designations, where xxx is
the nominal bandwidth. As an example, an N600 2x2 access point
can allocate a bonded channel two streams for a data rate of 300
Mbps, and if it does this simultaneously on both its 2.4 GHz and 5
GHz radios, the bandwidth of the access point could be described
as 600 Mbps.
Wi-Fi 5 (802.11ac)
Multiuser MIMO
Wi-Fi 6 (802.11ax)
Wi-Fi 6 works in both the 2.4 GHz and 5 GHz bands. The Wi-Fi 6e
standard adds support for a new 6 GHz frequency band. 6 GHz has
less range, but more frequency space, making it easier to use 80
and 160 MHz channels.
For each frequency band, you also need to select the operation
mode. This determines compatibility with older standards and
support for legacy client devices. Supporting older devices can
reduce performance for all stations.
Finally, for each frequency band, you need to configure the channel
number and whether to use channel bonding. If there are multiple
access points whose ranges overlap, they should be configured to
use nonoverlapping channels to avoid interference. An access
point can be left to autoconfigure the best channel, but this does
not always work well. You can configure wide channels (bonding)
for more bandwidth, but this has the risk of increased interference
if there are multiple nearby wireless networks. Channel bonding
may only be practical in the 5 GHz band, depending on the wireless
site design.
When you are measuring signal strength, dBm values closer to zero
represent better performance. A value around -65 dBm represents
a good signal, while anything over -80 dBm is likely to suffer packet
loss or be dropped.
Metageek inSSIDer Wi-Fi analyzer software showing nearby access points. (MetaGeek, LLC. ©
Copyright 2005-2021)
LONG-RANGE FIXED WIRELESS
Bluetooth
Summary
You should be able to compare network types (LAN, WLAN, WAN,
MAN, SAN, and PAN), network hardware, cable types, and wireless
protocols and use networking tools to install and verify local cabled
and wireless networks.
Configuring Network
Addressing and Internet
Connections
LESSON INTRODUCTION
LESSON OBJECTIVES
In this lesson, you will:
Compare Internet
Connection Types
A cable modem: The RJ45 port connects to the local network router, while the coax port
connects to the service provider network. (Image © 123RF.com.)
A F-type connector is screwed down to secure it. Do not
overtighten it.
FIBER TO THE CURB AND FIBER
TO THE PREMISES
Optical network terminal—the PON port terminates the external fiber cable and the LAN ports
connect to local routers or computers over RJ45 patch cords. (Image by artush © 123RF.com)
FIXED WIRELESS INTERNET
ACCESS
The 2.4 GHz and 5 GHz frequency bands used by Wi-Fi have limited
range, while fixed wireless internet requires a large dish antenna.
Cellular radio wireless networking facilitates communications over
much larger distances using mobile devices. Cellular networking is
also used by some Internet of Things (IoT) devices, such as smart
energy meters.
3G
4G
5G
The devices discussed so far enable physical links where the only
type of addressing used identifies a host hardware interface:
Digital modems, ONTs, and cellular radios transmit data over DSL,
cable, fiber, satellite, and cellular links to connect a local network
or device to an ISP. This is typically a point-to-point link and so does
not require unique interface addressing.
There are several types of routers and different uses for them. A
SOHO router often simply routes between its local network
interface and its WAN/Internet interface. An enterprise network is
likely to use different router models to perform different routing
tasks:
Once you have joined public and private networks using a router,
you then need to control which computers are allowed to connect
to them and which types of traffic you will accept. The role of
filtering allowed and denied hosts and protocols is performed by a
network firewall . A basic firewall is configured with rules, referred
to as a network access control list (ACL). Each entry in the ACL lists
source and/or destination network addresses and protocol types
and whether to allow or block traffic that matches the rule.
TCP/IP model.
Internet Layer
Transport Layer
Where the network layer deals with addressing, the Transport layer
determines how each host manages multiple connections for
different application layer protocols at the same time. The
transport layer is implemented by one of two protocols:
Transmission Control Protocol (TCP) guarantees connection-
oriented forwarding of packets. TCP can identify and recover from
lost or out-of-order packets, mitigating the inherent unreliability of
IP. This is used by most TCP/IP application protocols, as failing to
receive a packet or processing it incorrectly can cause serious data
errors. User Datagram Protocol (UDP) provides unreliable,
connectionless forwarding. UDP is faster and comes with less of a
transmission overhead because it does not need to send extra
information to establish reliable connections. It is used in time-
sensitive applications, such as speech or video, where a few
missing or out-of-order packets can be tolerated. Rather than
causing the application to crash, they would just manifest as a
glitch in video or a squeak in audio.
Application Layer
If all the bits in an octet are set to 1, the number obtained is 255
(the maximum possible value). Similarly, if all the bits are set to 0,
the number obtained is 0 (the minimum possible value). Therefore,
theoretically an IPv4 address may be any value between 0.0.0.0
and 255.255.255.255. However, some addresses are not permitted
or are reserved for special use.
NETWORK PREFIXES
In the example, the host will determine that the destination IPv4
address is on the same IP network (192.168.0.0/24) and try to
deliver the packet locally. On Ethernet, the host would use the
address resolution protocol (ARP) to identify the MAC address
associated with the destination IP address.
If the masked portion does not match, the host assumes that the
packet must be routed to another IP network. For example:
Different source and destination network IDs.
The address classes (A, B, and C) derive from the earliest form of IP.
When first defined, IP did not include the concept of subnet masks.
Hosts would identify the network ID just by using the address class.
The subnet masks that align precisely with octet boundaries mirror
this functionality. They are often referred to as the “default masks”:
Dotted Decimal
Class Network Prefix Binary Mask
Mask
11111111 00000000
A 255.0.0.0 /8
00000000 00000000
11111111 11111111
B 255.255.0.0 /16
00000000 00000000
11111111 11111111
C 255.255.255.0 /24
11111111 00000000
http://192.168.0.1
http://www.routerlogin.com
You can also use the management console to view line status and
the system log. These might be required by the ISP to troubleshoot
any issues with the connection.
Viewing DSL line status. (Screenshot courtesy of TP-Link.)
IPV6 ADDRESSING
IPv6 Notation
2001:0db8:0000:0000:0abc:0000:def0:1234
2001:db8::abc:0:def0:1234
An IPv6 address is divided into two main parts: the first 64 bits are
used as a network ID, while the second 64 bits designate a specific
interface.
In IPv6, the interface identifier is always the last 64 bits; the first 64 bits are used for network
addressing.
As the network and host portions are fixed size, there is no need
for a subnet mask. Network addresses are written using prefix
notation, where /nn is the length of the routing prefix in bits.
Within the 64-bit network ID, the length of any given network prefix
is used to determine whether two addresses belong to the same IP
network.
Dual Stack
● 52.165.16.254
● 192.168.100.52
● 169.254.1.121
● 172.30.100.32
● 224.100.100.1
Any given host will be communicating with many other hosts using
many different types of networking data. One of the functions of
the Transport layer is to identify each type of network application.
It does this by assigning each application a port number between 0
and 65535. For example, data addressed to the HTTP web
browsing application can be identified as port 80, while data
requesting an email transmission service can be identified as port
25. The host could be transmitting multiple HTTP and email
segments at the same time. These are multiplexed using the port
numbers onto the same network link.
Observing a UDP header in the final frame of the DHCP lease process with the Wireshark
protocol analyzer. (Screenshot courtesy of Wireshark.)
Two other examples of protocols that use UDP are DHCP and TFTP:
● Dynamic Host Configuration Protocol (DHCP)—This
protocol is used by clients to request IP configuration
information from a server. It uses broadcast transmissions,
which are not supported by TCP, so it must use UDP. The
protocol is quite simple, so if a response packet is not
received, the client just restarts the process and tries again
repeatedly, until timing out.
● Trivial File Transfer Protocol (TFTP) —This protocol is
typically used by network devices to obtain a configuration
file. The application protocol uses its own acknowledgement
messaging, so it does not require TCP.
WELL-KNOWN PORTS
Make a secure
connection to the
22 TCP Secure Shell (SSH)
command-line
interface of a server
Make an unsecure
connection to the
23 TCP Telnet
command-line
interface of a server
Transfer email
Simple Mail Transfer
25 TCP messages across a
Protocol (SMTP)
network
Facilitate
identification of
Domain Name
53 TCP/UDP hosts by name
System (DNS)
alongside IP
addressing
Request a dynamic
IP address
68 UDP DHCP Client
configuration from a
server
Provision unsecure
HyperText Transfer
80 TCP websites and web
Protocol (HTTP)
services
Retrieve email
Post Office Protocol
110 TCP messages from a
(POP)
server mailbox
Support networking
137-139 UDP/TCP NetBIOS over TCP/IP features of legacy
Windows versions
Report status
SNMP trap
162 UDP information to a
operation
management server
Provision secure
HTTP Secure
443 TCP websites and
(HTTPS)
services
Implement
Windows-
compatible file and
printer sharing
Server Message services on a local
445 TCP
Block (SMB) network (also
sometimes referred
to as Common
Internet File System
[CIFS])
Port# TCP/UDP Protocol Purpose
Make a secure
Remote Desktop connection to the
3389 TCP
Protocol (RDP) graphical desktop of
a computer
Compare Network
Configuration Concepts
DHCP Scope
DHCP Leases
DHCP Reservations
Immediately below the root lie the top-level domains (TLDs). There
are several types of TLDs, but the most prevalent are generic (such
as .com, .org, .net, .info, .biz), sponsored (such as .gov, .edu), and
country code (such as .uk, .ca, .de). DNS is operated by ICANN (
icann.org ), which also manages the generic TLDs. Country codes
are generally managed by an organization appointed by the
relevant government.
DNS hierarchy. (Images © 123RF.com.)
Each FQDN reflects this hierarchy, from most specific on the left
(the host name) to least specific on the right (the TLD followed by
the root). For example: pc.corp.515support.com.
DNS QUERIES
Both types of host records (A and AAAA) in Windows Server DNS. (Screenshot courtesy of
Microsoft.)
Summary
You should be able to compare Internet connection types, TCP/IP
protocols, and common network configuration concepts and to
configure SOHO routers and clients.
Supporting Network
Services
LESSON INTRODUCTION
LESSON OBJECTIVES
Summarize Services
Provided by Networked
Hosts
IP, TCP/UDP, DHCP, and DNS establish the basic addressing and
forwarding functions necessary to implement network connectivity.
Network applications use these underlying network and transport
functions to run user-level services, such as web browsing or file
sharing. In this topic, you will learn to summarize the server roles
that are used to implement network applications.
FILE/PRINT SERVERS
SMB has gone through several updates, with SMB3 as the current
version. SMB1 has very serious security vulnerabilities and is now
disabled by default on current Windows versions (
docs.microsoft.com/en-us/windows-server/storage/file-
server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3 ).
Modern networks use IP, TCP/UDP, and DNS for these functions, so
NetBT is obsolete. NetBT should be disabled on most networks, as
it poses a significant risk to security. It is only required if the
network must support file sharing for Windows versions earlier
than Windows 2000.
A web server is one that provides client access using HTTP or its
secure version (HTTPS). Websites and web applications are perhaps
the most useful and ubiquitous of network services. Web
technology can be deployed for a huge range of functions and
applications, in no way limited to the static pages of information
that characterized the first websites.
Using Firefox’s web developer tools to inspect the HTTP requests and response headers
involved in serving a typical modern web page. (Screenshot courtesy of Mozilla.)
HyperText Markup Language, Forms, and Web
Applications
HTTP is usually used to serve HTML web pages, which are plain text
files with coded tags describing how the document should be
formatted. A web browser can interpret the tags and display the
text and other resources associated with the page (such as picture
or sound files). Another powerful feature is the ability to provide
hyperlinks to other related documents. HTTP also features forms
mechanisms (POST) whereby a user can submit data from the
client to the server.
One of the critical problems for the provision of early websites was
the lack of security in HTTP. Under HTTP, all data is sent
unencrypted, and there is no authentication of client or server.
Secure Sockets Layer (SSL) was developed by Netscape in the
1990s to address these problems. SSL proved very popular with
the industry. Transport Layer Security (TLS) was developed from
SSL and ratified as a standard by the IETF.
The server and client use the key pair in the digital certificate and a
chosen cipher suite within the TLS protocol to set up an encrypted
tunnel. Even though someone else might know the public key, they
cannot decrypt the contents of the tunnel without obtaining the
server’s private key. This means that the communications cannot
be read or changed by a third party.
A client connects to an IMAP server over port TCP/143, but this port
is unsecure. Connection security can be established using TLS. The
default port for IMAP-Secure (IMAPS) is TCP/993.
DIRECTORY AND
AUTHENTICATION SERVERS
With AAA, the network access appliances do not have to store any
authentication credentials. They simply act as a transit to forward
this data between the AAA server and the supplicant. AAA is often
implemented using a protocol called Remote Authentication
Dial-in User Service (RADIUS) .
Communications between RADIUS server, client, and supplicant in AAA architecture. (Images ©
123RF.com.)
REMOTE TERMINAL ACCESS
SERVERS
Secure Shell
RDP clients are available for other OSs, including Linux, macOS,
iOS, and Android so you can connect to a Windows desktop
remotely using a non-Windows device. There are also open-source
RDP server products, such as xrdp (xrdp.org).
NETWORK MONITORING
SERVERS
SSH and RDP allow administrators to log on and manage hosts and
switches/routers/firewalls remotely. For a network to run
smoothly, it is also important to gather information regularly from
these systems. This type of remote monitoring can identify an
actual or possible fault more quickly.
SNMP device queries take place over port UDP/161; traps are
communicated over port UDP/162.
Syslog
On a SOHO network, devices on the LAN access the Internet via the
router using a type of NAT, specifically port-based or overloaded
NAT. This type of NAT device translates between the private IP
addresses used on the LAN and the publicly addressable IP
address configured on the router’s WAN interface.
Many enterprise networks also use some sort of NAT, but another
option is to deploy a proxy server . A proxy server does not just
translate IP addresses. It takes a whole HTTP request from a client,
checks it, then forwards it to the destination server on the Internet.
When the reply comes back, it checks it and then shuttles it back to
the LAN computer. A proxy can be used for other types of traffic
too (email, for instance).
Configuring the Firefox web browser to use a proxy server at 192.168.0.1 to connect to the
Internet. (Screenshot courtesy of Mozilla.)
Legacy systems usually work well for what they do—which is why
they don’t get prioritized for replacement—but they represent
severe risks in terms of security vulnerabilities. If attackers discover
faulty code that they can use to try to exploit the device, the
vendor will not be available to develop a software patch to block
the exploit. It is important to isolate them as far as possible from
the rest of the network and to ensure that any network channels
linking them are carefully protected and monitored.
EMBEDDED SYSTEMS AND
SCADA
Troubleshoot Networks
If a user is looking for a network name that is not shown in the list
of available wireless networks (SSID not found), the user could be
out of range or the SSID name broadcast might be suppressed. In
the latter scenario, the connection to the network name must be
configured manually on the client.
Also consider that not all clients supporting 802.11n have dual-
band radios. If a client cannot connect to a network operating on
the 5 GHz band, check whether its radio is 2.4 GHz-capable only.
While slow network speeds are a problem for all types of network
traffic, there are other performance characteristics that affect real-
time network protocols and devices. “Real time” refers to services
such as voice and video. One example is Voice over Internet
Protocol (VoIP) protocols. These use data networks to implement
voice calling. The symptoms of poor VoIP service quality are
dropouts, echo, or other glitches in the call.
The Bandwidth Control feature on this router/modem provides a basic QoS mechanism.
(Screenshot courtesy of TP-Link.)
Summary
You should be able to summarize services provided by networked
hosts and troubleshoot common problems with wired and wireless
links.
Summarizing Virtualization
and Cloud Concepts
LESSON INTRODUCTION
LESSON OBJECTIVES
Summarize Client-Side
Virtualization
Type I bare metal hypervisor. The hypervisor is installed directly on the host hardware along
with a management application, then VMs are installed within the hypervisor.
USES FOR VIRTUALIZATION
Client-Side Virtualization
Server-Side Virtualization
Server-side virtualization means deploying a server role as a virtual
machine. For server computers and applications, the main use of
virtualization is better hardware utilization through server
consolidation. A typical hardware server may have resource
utilization of about 10%. This implies that you could pack the server
computer with another 8–9 server software instances and obtain
the same performance.
Application Virtualization
Container Virtualization
System Memory
Microsoft Hyper-V hypervisor software. This machine is running several Windows and Linux
guest OSs. You can see each is allocated a portion of system memory to use. (Screenshot
courtesy of Microsoft.)
Mass Storage
Networking
Guest OS Security
Host Security
Hypervisor Security
Apart from ensuring the security of each guest OS and the host
machine itself, the hypervisor must also be monitored for security
vulnerabilities and exploits. Another issue is virtual machine
escaping (VM escaping) . This refers to malware running on a
guest OS jumping to another guest or to the host. As with any
other type of software, it is vital to keep the hypervisor code up to
date with patches for critical vulnerabilities.
Review Activity: Client-Side
Virtualization
Summarize Cloud
Concepts
Infrastructure as a Service
Software as a Service
Platform as a Service
Dashboard for Amazon Web Services Elastic Compute Cloud (EC2) IaaS/PaaS. (Screenshot
courtesy of Amazon.)
DESKTOP VIRTUALIZATION
When the thin client starts, it boots a minimal OS, allowing the user
to log on to a VM stored on the company server or cloud
infrastructure. The user makes a connection to the VM using some
sort of remote desktop protocol, such as Microsoft Remote
Desktop or Citrix ICA. The thin client must locate the correct image
and use an appropriate authentication mechanism. There may be a
1:1 mapping based on machine name or IP address, or the process
of finding an image may be handled by a connection broker.
Summary
You should be able to summarize aspects of client-side
virtualization and cloud computing.
LESSON INTRODUCTION
This lesson focuses on mobile devices and how they differ from
desktop systems in terms of features, upgrade/repair procedures,
and troubleshooting. As a certified CompTIA® A+® technician, you
will be expected to configure, maintain, and troubleshoot laptops,
smartphones, and tablets. With the proper information and the
right skills, you will be ready to support these devices as efficiently
as you support their desktop counterparts.
LESSON OBJECTIVES
In the types of flat panel used for computer and mobile device
displays, the liquid crystal elements and transistors are placed on a
thin film transistor (TFT) , and such LCD panels are often just
referred to as “TFTs.” There are three main types of TFT technology:
The display panel is only a single layer within the screen assembly
for a mobile device. Several other display components make up
the whole screen.
Digitizer Functions
Some laptops are based on tablet hybrid form factors where the
touch screen display can be fully flipped or rotated between
portrait and landscape orientations. Another approach, used on
Microsoft’s Surface tablet/laptop hybrids, is for the keyboard
portion of the laptop to be detachable and for the screen to work
independently as a tablet.
MOBILE DEVICE ACCESSORIES
The digitizer touch and gesture support built into touchscreens can
be deployed in a variety of other form factors:
Use the Settings app in Windows 10 to configure touchpad settings, such as sensitivity, tap
events, and gestures. (Screenshot courtesy of Microsoft.)
Touch Pens
Airplane Mode
When the cellular radio is enabled, the icon on the status bar
shows which generation of data connection has been established:
Configuring cellular data options in iOS (left) and Android (right). (Screenshots reprinted with
permission from Apple Inc., and Android platform, a trademark of Google LLC.)
MOBILE HOTSPOTS AND
TETHERING
Configuring mobile hotspot settings (left), then enabling it (right). In this figure, hosts can
connect to the “hippo” network and use the device’s cellular data plan to get Internet access.
(Screenshot courtesy of Android platform, a trademark of Google LLC.)
Configuring tethering on an Android phone. The device in this figure is connected to the PC
over USB, but you could use Bluetooth too. (Screenshot courtesy of Android platform, a
trademark of Google LLC.)
MOBILE DEVICE WIRED
CONNECTION METHODS
Laptop Ports
Laptops ship with standard wired ports for connectivity. The ports
are usually arranged on the left and right edges. Older laptops
might have ports at the back of the chassis. There will be at least
one video port for an external display device, typically HDMI or
DisplayPort/Thunderbolt, but possibly VGA or DVI on older laptops.
There will also be a few USB Type A ports and one or more USB
Type C ports on a modern laptop, some of which may also function
as Thunderbolt ports.
Most iPhone and iPad Apple devices use the proprietary Lightning
connector. Some of the latest iPad models, such as the iPad Pro,
use USB-C.
Serial Interfaces
Enabling Bluetooth
Bluetooth needs to be enabled for use via device settings. You may
also want to change the device name—remember that this is
displayed publicly.
Enabling Bluetooth on an Android device. In this figure, the Android device is named
“COMPTIA-MOBILE.” “COMPTIA” is a nearby Windows PC with Bluetooth enabled. (Screenshot
courtesy of Android platform, a trademark of Google LLC.)
Enable Pairing
To test the connection, you can simply try using the device—check
that music plays through Bluetooth headphones, for example. If
you are connecting a device and a PC, you can use the Bluetooth
icon to try to send a file.
If you cannot connect a device, check that both have been made
discoverable. If you make a computer or mobile device
discoverable, check the pairing list regularly to confirm that the
devices listed are valid.
NEAR-FIELD COMMUNICATION
WIRELESS CONNECTIONS
Port Replicator
Docking Station
iOS Apps
In iOS, apps are distributed via Apple’s App Store . Apps must be
submitted to and approved by Apple before they are released to
users. This is also referred to as the walled garden model and is
designed to prevent the spread of malware or code that could
cause faults or crashes. Apps can use a variety of commercial
models, including free to use, free with in-app purchases, or paid-
for.
Third-party developers can create apps for iOS using Xcode, which
is Apple’s integrated development environment (IDE), and the
programming language Swift. Xcode can only be installed and run
on a computer using macOS.
Apple’s App Store and app permission settings. This app is already installed, but an update is
available. (Screenshot reprinted with permission from Apple Inc., and WhatsApp.)
Android Apps
Permissions
As well as managing the app store, the owner account can be used
to access various services, such as an email account and cloud
storage. However, the device owner might want to use multiple
other accounts or digital identities in conjunction with different
apps. These accounts allow app settings and data to be
synchronized between multiple devices. For example, a user can
access his or her contacts list from both his or her mobile device
and his or her laptop computer. Some examples of these services
include:
iOS supports a single Apple ID account per device. (Screenshot reprinted with permission from
Apple Inc.)
TYPES OF DATA TO
SYNCHRONIZE
Contacts
Calendar
Most email systems store messages on the server, and the client
device is used to manage them. There can often be sync issues,
however, particularly with deletions, sent items, and draft
compositions.
The main sync issue with media files such as photos tends to be
the amount of space they take up. There might not be enough
space on one device to sync all the files the user has stored. There
can also be issues with file formats; not all devices can play or
show all formats. Users editing a document on different devices
may have trouble with version history unless the changes are
saved directly to the copy stored in the cloud.
Apps
An app will be available across all devices that the account holder
signs in on, as long as they are on the same platform. If you have a
Windows PC and an Apple iPhone, you will find yourself managing
two sets of apps. Most of them will share data seamlessly, however
(the social media ones, for instance).
Passwords
Both iOS and Android will prompt you to save passwords when you
sign in to apps and websites. These passwords are cached securely
within the device file system and protected by the authentication
and encryption mechanisms required to access the device via the
lock screen.
Account settings for the Google master account on an Android smartphone. This account is
used for the Play Store and to sync data with other cloud services, but not email, contacts, or
calendar. (Screenshot courtesy of Android platform, a trademark of Google LLC.)
Synchronizing to PCs
Synchronizing to Automobiles
Endpoint management software such as Microsoft Intune can be used to approve or prohibit
apps. (Screenshot courtesy of Microsoft.)
Distinctive features of a laptop computer, including the built-in screen, integrated keyboard,
touchpad pointer control, and I/O ports (on both sides and rear of chassis). (Image ©
123RF.com)
Laptops use smaller screws than are found on desktops. You may
find it useful to obtain a set of precision screwdrivers and other
appropriate hand tools. It is also much easier to strip the screws—
remove the notch for the screwdriver—take care and use an
appropriately sized screwdriver!
AC Adapters
AC adapters are also rated for their power output (ranging from
around 65–120 W). Again, this information will be printed on the
adapter label. The AC adapter connects to the laptop via a DC jack
or a USB port.
Battery Power
Before inserting or removing the battery pack, you must turn the
machine off and unplug it from the AC wall outlet. A portable
battery is usually removed by releasing catches on the back or
underside of the laptop.
You can obtain mini PCIe or M.2 adapters for laptops that will
provide some combination of Wi-Fi, Bluetooth, and/or cellular data
connectivity. Remember that when upgrading this type of adapter,
you need to re-connect the antenna wires used by the old adapter
or install a new antenna kit. The antenna wires are usually routed
around the screen in the laptop’s lid. The antenna connections can
be fiddly to connect and are quite delicate, so take care.
Wi-Fi adapter installed as a mini PCIe card. Note the antenna wire connections. (Image
courtesy of CompTIA.)
The fixed disk can usually be accessed via a panel, but you may
have to open the chassis on some models.
Laptop HDDs are usually 2.5” form factor, though sometimes the
1.8” form factor is used. Compared to 3.5” desktop versions,
magnetic 2.5” HDDs tend to be slower (usually 5400 rpm models)
and have lower capacity. Within the 2.5” form factor, there are also
reduced height units designed for ultraportable laptops. A
standard 2.5” drive has a z-height of 9.5 mm; an ultraportable
laptop might require a 7 mm (thin) or 5 mm (ultrathin) drive.
An SSD flash storage device can also use the SATA interface and
connector form factors but is more likely to use an adapter card
interface:
Key Replacement
Near-field Scanner
Troubleshoot Mobile
Device Issues
If the battery is properly inserted and the mobile device does not
switch on or only remains on for a few seconds, it is most likely
completely discharged. A battery exhibiting poor health will not
hold a charge. This means that the battery is at the end of its useful
life. You can test this by using a known good battery. If a known
good battery does not work, then there is something wrong with
the power circuitry on the motherboard.
Properly caring for the battery not only prolongs battery life but
also mitigates health and safety risks. Use the battery charger
provided by the manufacturer or an approved replacement
charger. Using an incorrect battery charging cable or exposing a
battery to extreme heat carries risks of fire or even explosion.
Overheating Symptoms
Mobile devices are very easy to drop, and while the glass is
designed to be tough, impacts on a hard surface from over 1m in
height will usually result in cracking or shattering. If only the glass
layer is damaged, the digitizer and display may remain usable, to
some extent. A broken screen is likely to require warranty or
professional services to repair it, however.
If there are no visible cracks, the screen or digitizer circuitry
may have been damaged by liquid.
Digitizer Issues
● Verify that the touchscreen and the user’s fingers are clean
and dry.
● If a screen protector is fitted, check that it is securely adhered
to the surface and that there are no bubbles or lifts.
● Check that there is not a transitory software problem by
restarting the device. Holding the power button (Android) or
Sleep and Home buttons (iPhone) for a few seconds will force
the device to perform a soft reset.
● Try using the device in a different location in case some
source of electromagnetic interference (EMI) is affecting the
operation of the digitizer.
● If the device has just been serviced, check that the right wires
are still connected in the right places for the digitizer to
function. Remember to ask, “What has changed?”
The radio antenna wire for a mobile will be built into the
case (normally around the screen). On some devices,
certain hand positions can stop the antenna from
functioning as well as it should.
Network Cell Info Lite showing cell tower connection status in the top gauge and Wi-Fi in the
lower gauge. (Screenshot used with permission from M2Catalyst, LLC).
Summary
You should be able to set up and troubleshoot mobile-device
accessories, connectivity, and applications.
● Document supported display types (LCD IPS, LCD TN, LCD VA,
OLED) and connection methods (USB, Lightning, Serial,
Bluetooth, NFC, Wi-Fi, and Cellular) to facilitate issue
identification and maintain a spare parts inventory.
● Educate users on procedures for enabling/disabling radios,
using connector cables correctly, and pairing Bluetooth
peripherals to reduce support calls.
● Identify support procedures to help users manage Microsoft
365, Google Workspace, and iCloud digital identities.
● Identify support procedures to assist users synchronizing
mail, photos, calendar, and contacts between devices and
cloud services and recognizing data caps.
● Create work instructions for enrolling devices in MDM/MAM
suites and configuring corporate email, apps, and two-factor
authentication.
● Create work instructions and prepare inventory to support
laptop repair and upgrade tasks, such as battery,
keyboard/keys, RAM, HDD/SSD migration, wireless cards, and
biometric/NFC security components.
● Establish a knowledge base to document symptoms and
solutions to common issues, such as poor battery health,
swollen battery, broken screen, improper charging, poor/no
connectivity, liquid damage, overheating, digitizer issues,
physically damaged ports, malware, and cursor drift/touch
calibration.
Lesson 9
LESSON INTRODUCTION
LESSON OBJECTIVES
The following criteria are used to select the best type and model of
printer:
Setup Location
Unboxing
● Many print devices are heavy and may require two persons to
lift safely. Make sure you use safe lifting techniques and bend
at the knees to avoid damaging your back. Identify handle
locations on the device, and use only those to grip and lift it. If
carrying a bulky device, ensure the path is free from trip
hazards.
● Printer parts will be secured using packing strips and
supports. Ensure that these are all removed before the
printer is switched on. Remember to check for strips on
removable components that are concealed by panels.
● A print device should normally be left to acclimate after
removing the packaging materials. Leave the device unboxed
and powered off for a few hours to reduce risks from
condensation forming within an appliance that has moved
from a cold storage/transport environment to a warmer
installation environment. Similarly, printer paper should be
stored for a day or more before use to allow it to adjust to the
temperature and humidity of the installation location.
PRINT DEVICE CONNECTIVITY
Using Windows Settings to verify printer installation to the USB port. (Screenshot courtesy of
Microsoft.)
Setting the IP address configuration method via the printer’s control panel. (Image courtesy of
CompTIA.)
The two principal wireless printer interfaces are Bluetooth and Wi-
Fi.
A PDL is used to create a raster file from the print commands sent
by the software application. A raster file is a dot-by-dot description
of where the printer should place ink. In general terms, a PDL
supports the following features:
Viewing the print queue and configuring preferences through the Printers and Scanners
Settings app page. (Screenshot courtesy of Microsoft.)
The About tab contains information about the driver and the
printer vendor and may include links to support and
troubleshooting tips and utilities.
PRINTING PREFERENCES
Printing Preferences dialog box—this shortcuts tab lets you select from preset option
templates. (Screenshot courtesy of Microsoft.)
Paper/Quality
The Paper/Quality tab allows you to choose the type of paper
stock (size and type) to use and whether to use an economy or
draft mode to preserve ink/toner. You can also use the Color tab to
select between color and grayscale printing.
Use the Paper/Quality tab to configure the paper type and whether to use a reduced ink/toner
economy mode. (Screenshot courtesy of Microsoft.)
Finishing
The Finishing tab lets you select output options such as whether
to print on both sides of the paper (duplex), print multiple images
per sheet, and/or print in portrait or landscape orientation.
PRINTER SHARING
Installing a network printer using a vendor tool. The printer has been connected to the network
via an Ethernet cable and been assigned an Internet Protocol (IP) address by a Dynamic Host
Configuration Protocol (DHCP) server.
Sharing a printer via the Printer Properties dialog box. Use the Additional Drivers button from
the Sharing page to install drivers for operating systems other than the host print server.
(Screenshot courtesy of Microsoft.)
User Authentication
Audit Logs
An MFD that can scan, print, and fax documents. (Image © 123RF.com)
Scanner Types
Before you can provide the right level of support for print services,
you must understand how the various components work within
each type of print device to provide the desired outputs. In this
topic, you will learn the components and maintenance procedures
for laser, inkjet, thermal, impact, and 3-D print device types.
LASER PRINTER IMAGING
PROCESS
Laser printers are one of the most popular printer technologies for
office applications because they are inexpensive (both to buy and
to run), quiet, and fast, and they produce high-quality output that
does not smear or fade. There are both grayscale and color
models.
The laser print process follows the steps detailed in the following
sections.
Processing Stage
Exposing Stage
Developing Stage
Transferring Stage
The transferring stage moves the toner from the drum onto the
print media. The paper transport mechanism includes components
such as gears, pads, and rollers that move the paper through the
printer. Pickup components lift a single sheet of paper from the
selected input tray and feed it into the printer. To do this, a pickup
roller turns once against the paper stack, pushing the paper into a
feed and separation roller assembly. This assembly is designed to
allow only one sheet to pass through.
Pickup, feed, and separation rollers on an HP 5Si laser printer. (Image courtesy of CompTIA.)
When the paper reaches the registration roller, a signal tells the
printer to start the image development process. When the drum is
ready, the paper is fed between the imaging drum and the high
voltage transfer roller . The transfer roller applies a positive
charge to the underside of the paper. This causes the toner on the
drum to be attracted to the paper. As the paper leaves the transfer
assembly, a static eliminator strip (or detac corona) removes any
remaining charge from the paper. This is done to avoid the paper
sticking to the drum or curling as it enters the fuser unit.
Fusing Stage
From the transfer assembly, the paper passes into the fuser
assembly . The fuser unit squeezes the paper between a hot roller
and a pressure roller so that the toner is melted onto the surface
of the paper. The hot roller is a metal tube containing a heat lamp;
the pressure roller is typically silicon rubber. The heat roller has a
Teflon coating to prevent toner from sticking to it.
Cleaning Stage
If there is no auto duplex unit, the user can manually flip the paper
stack. When manual duplex mode is selected for the print job, the
printer pauses after printing the first side of each sheet. The user
must then take the printed pages and return them (without
changing the orientation) to the same input paper tray. Once this is
done, the user can resume the print job.
Color laser print devices use separate toner cartridges for each
additive CMYK color. Color laser printers can use different
processes to create the image. Some may use four passes to put
down each color in turn; others combine the colored toner on a
transfer belt and print in one pass.
LASER PRINTER MAINTENANCE
Loading Paper
The printer will report when a tray runs out of paper. When loading
new paper, remember the following guidelines:
● Use good quality paper designed for use with the model of
printer that you have and the required output type
(document versus photo, for instance).
● Position the media guides at the edges of the loaded stack.
The printer uses sensors from the guides to detect the paper
size. Different trays may support different types, sizes, and
thicknesses of media. Do not add unsupported media to a
tray or overload it.
● Do not use creased, dirty, or damp paper. Ensure that paper
is stored in a climate-controlled location with no excessive
humidity, temperature, or dust.
Take the new cartridge and remove the packing strips as indicated
by the instructions. Rock the cartridge gently from front to back to
distribute the toner evenly. Insert the cartridge, close the service
panel, turn on, and print a test page.
Remove the old fuser and rollers and clean the printer. Install the
fuser and new rollers—remembering to remove the packing strips
and following the instructions carefully.
Calibrating a Printer
Inkjet printers are often used for good-quality color output, such
as photo printing. Inkjets are typically cheap to buy but expensive
to run, with costly consumables such as ink cartridges and high-
grade paper. Compared to laser printers, they are slower and often
noisier, making them less popular in office environments, except
for low-volume, good-quality color printing.
There are two main types of inkjet print head. Epson printers use
a charge (or piezoelectric) method. HP, Canon, and Lexmark use a
thermal method. Each of these four vendors has licensed its inkjet
technology to several other vendors to produce re-branded
versions of its printers.
● With the thermal method, the ink at each nozzle in the print
head is heated, creating a bubble. When the bubble bursts, it
sprays ink through the nozzle and draws more ink from the
reservoir. In general, thermal inkjet print heads are cheaper
and simpler to produce, but the heating elements have a
relatively short life. Most thermal printers use a combined
print head and ink reservoir. When the ink runs out, the print
head is also replaced.
● In the Epson design, the nozzle contains a piezoelectric
element, which changes shape when a voltage is applied. This
acts like a small pump, pushing ink through the nozzle and
drawing ink from the reservoir.
Carriage System
Inkjet printers build up the image line by line. The print head is
moved back and forth over the paper by a carriage system. On
some types of printers, ink is applied when the print head moves in
one direction only; bidirectional models apply ink on both the
outward and return passes over the page. The carriage system
uses a stepper motor, pulley, and belt to move the print head, a
guide shaft to keep the print head stable, and sensors to detect the
position of the print head. A flat ribbon data cable connects the
print head to the printer’s circuit board.
There may also be a lever used to set the platen gap or the printer
may adjust this automatically depending on driver settings. The
platen gap is the distance between the print head and the paper.
Having an adjustable platen gap allows the printer to use thicker
media.
Most inkjets only support one paper path, with single input and
output trays, though some have automatic duplexers, and some
may have accessory trays. Printers are generally split between
models that load from the top and output at the bottom and those
that have both input and output bins at the bottom and turn the
paper (an “up-and-over” path).
Inkjets tend to have smaller paper trays than laser printers and
therefore can need restocking with paper more often. Most inkjets
can use “regular” copier/laser printer paper, but better results can
be obtained by using less absorbent, premium grades of paper
stock, specifically designed for inkjet use. Often this type of paper
is designed to be printed on one side only—make sure the paper is
correctly oriented when loading the printer.
Use the Maintenance or Tools tab on an inkjet printer’s property sheet to access cleaning
routines and calibration utilities. (Screenshot courtesy of Microsoft.)
THERMAL PRINTER
MAINTENANCE
When you are replacing the paper roll, you need to obtain the
specific size and type for the brand and model of thermal printer
you are using. The process is usually quite simple—just open the
printer case, insert the roll, keeping the shiny, heat -sensitive print
side facing outward, then ensure that the end of the paper is held
in place by the print head when closing the case again.
Label printers can end up with sticky residue inside the printer. If
labels are not loaded correctly, they can separate from the backing
while being fed through the printer. You will need to ensure users
know how to properly load the labels and how to clean up if labels
get stuck inside the printer. Use a swab and appropriate cleaning
fluid, such as isopropyl alcohol (IPA), to clean the print head or any
sticky residue inhibiting the feed mechanism. Alternatively, you can
often purchase cleaning cards to feed through the printer to clean
the print head safely.
IMPACT PRINTER
MAINTENANCE
The sliced model is then fed to the 3-D printer over a USB or Wi-Fi
connection or by inserting an SD card containing the file into the
printer. The printer then melts a filament and extrudes it onto the
build surface, creating layer upon layer based on the slices. The
extruder (and sometimes the build bed) is moved as needed on
X/Y/Z axes to create the build.
● Print bed / build plate —a flat glass plate onto which the
material is extruded. The bed is usually heated to prevent the
material from warping. The bed must be leveled for each
print job—this is usually automated, but cheaper printer
models require manual calibration. It is very important that
the printer frame be strong and rigid enough to keep the bed
as stable as possible. Any vibration will result in poor-quality
printing.
● Bed/build surface—a sheet placed onto the base plate to
hold the object in position while printing but also allow its
removal on completion. The bed surface material may need
to be matched to the filament material for best results.
● Extruder—the equivalent of a print head in an inkjet. A motor
in the extruder draws filament from the “cold end” through to
the nozzle (or “hot end”), where it is melted and squirted onto
the object. Different-size nozzles can be fitted to the extruder.
● Gears/motors/motion control—enable precise positioning
of the extruder.
● Fan—cools the melted plastic where necessary to shape the
object correctly.
Filament
There are two other common types of 3-D printer. These use
different materials than filament:
The printer control panel should identify the location of the paper jam. (Image courtesy of
CompTIA.)
If paper jams are frequent, you need to diagnose the problem
rather than simply fix the symptom each time. Most paper jams
arise because the media (paper or labels) are not suitable for the
printer or because a sheet is creased, folded, or not loaded
properly in the tray. There could be a problem with a roller too.
Identify whether or not the jam occurs in the same place each time,
and take appropriate preventive maintenance (clean or replace the
part).
If the media and pickup rollers are good and if the jam
occurs within the drum assembly but before the image is
fused, the cause could be a faulty static eliminator.
Normally, this part removes the high static charge from the
paper as it leaves the transfer unit. If the strip fails, the
paper may stick to the drum or curl as it enters the fuser
unit.
With an inkjet, it is usually easy to see exactly where the paper has
jammed. If the sheet will not come out easily, do not just try to pull
it harder—check the instruction manual to find out how to release
any components that might prevent you from removing the paper.
● Verify that the paper size and weight is compatible with the
options allowed for the print tray and that it is loaded in the
tray properly with the media guides set properly.
● Check that the paper is not creased, damp, or dirty.
Lines in dot matrix printer output indicate a stuck pin in the print
head. Output can also be affected by the platen position. The
platen adjusts the gap between the paper and the print head to
accommodate different paper types. Incorrect adjustment of the
platen gap can cause faint printing (gap too wide) or smudging (too
narrow).
FINISHING ISSUES
Print Monitors
The print monitor transmits the print job to the printer and
provides status information. If a problem is encountered during
printing, the print device sends a status message back to the print
monitor, which displays a desktop notification.
A garbled print is one where the print device emits many pages
with a few characters on each or many blank pages. This typically
occurs because of a fault in rendering the print job somewhere in
the path between the application, printer driver, page description
language, and print device. To discount a transitory error, cancel
the print job, clear the print queue, cycle the power on the printer
(leaving it off for 30 seconds to clear the memory), and try to print
again.
Use the OS to print a test page. If the test page prints successfully,
then the problem is related to the print function of a particular
application. Try printing a different file from the same application;
if this works, then you know that the problem is specific to a
particular file. If the test page does not print, try using the printer’s
control panel to print a test page directly from the device. If this
works, there is some sort of communication problem between the
print device and Windows.
If the problem persists, update the printer driver, and check that
the printer is set to use a PDL (PCL or PostScript) that is supported
by the source application.
If the characters in a document are different from those expected
or if strange characters appear in an otherwise normal print, check
that fonts specified in the document are available on the PC and/or
printer. The software application should indicate whether the
specified font is available or whether it is substituting it for the
nearest match.
Review Activity: Print
Device Issues
Summary
You should be able to deploy, maintain, and troubleshoot printers
and multifunction devices.
Configuring Windows
LESSON INTRODUCTION
In this lesson, you will learn how the basic administrative interfaces
for Microsoft® Windows 10® and Microsoft® Windows 11® can be
used to configure user and system settings.
LESSON OBJECTIVES
In this topic, you will use the Windows Settings and Control Panel
interfaces plus file management tools to configure user and
desktop options on computers running Windows 10 and Windows
11.
WINDOWS INTERFACES
Windows 10 Desktop
The top level of the user interface is the desktop. This is displayed
when Windows starts, and the user logs on. The desktop contains
the Start menu, taskbar, and shortcut icons. These are all used to
launch and switch between applications.
Windows 11 Desktop
The Windows Settings app and Control Panel are the two main
interfaces for administering Windows. Administering an OS means
configuring options, setting up user accounts, and adding and
removing devices and software. All Windows configuration data is
ultimately held in a database called the registry. Windows Settings
and Control Panel contain graphical pages and applets for
modifying these configuration settings.
Windows Settings
Home page in the Windows 10 Settings app showing the top-level configuration headings or
groups. (Screenshot courtesy of Microsoft.)
In Windows 11, the Settings app has no “home” page. Use the
Menu icon to navigate between the headings groups:
Control Panel
Each icon in the Control Panel represents an applet used for some
configuration tasks. Most applets are added by Windows, but some
software applications, such as antivirus software, add their own
applets.
Windows 10 Control Panel. (Screenshot courtesy of Microsoft.)
ACCOUNTS SETTINGS
Accounts Settings
The Time & Language settings pages are used for two main
purposes:
Personalization Settings
System Objects
While the system objects represent logical storage areas, the actual
data files are written to disk drives. Within the This PC object,
drives are referred to by letters and optional labels. A “drive” can
be a single physical disk or a partition on a disk, a shared network
folder mapped to a drive letter, or a removable disc. By convention,
the A: drive is the floppy disk (very rarely seen these days) and the
C: drive is the partition on the primary fixed disk holding the
Windows installation.
Every drive contains a directory called the root directory. The root
directory is represented by the backslash ( \ ). For example, the
root directory of the C: drive is C:. Below the root directory is a
hierarchy of subdirectories, referred to in Windows as folders. Each
directory can contain subfolders and files.
Typical Windows directory structure.
System Files
System files are the files that are required for the operating system
to function. The root directory of a typical Windows installation
normally contains the following folders to separate system files
from user data files:
File Explorer has configurable options for view settings and file
search.
General and view configuration settings in the File Explorer Options dialog. (Screenshot
courtesy of Microsoft.)
On the View tab, among many other options, you can configure
the following settings:
Indexing Options
You can configure file search behavior on the Search tab of the File
Explorer Options dialog. Search is also governed by settings
configured in the Indexing Options applet. This allows you to
define indexed locations and rebuild the index. Indexed locations
can include both folders and email data stores. A corrupted index
is a common cause of search problems.
Indexing Options dialogs. (Screenshot courtesy Microsoft.)
Review Activity: Windows
User Settings
In this topic, you will use the Settings and Control Panel interfaces
to configure system, app, network, and device settings in Windows
10 and Windows 11.
SYSTEM SETTINGS
The System Settings page in the Settings app presents options for
configuring input and output devices, power, remote desktop,
notifications, and clipboard (data copying). There is also an About
page listing key hardware and OS version information.
Windows Update
Windows Security
The Windows Security page contains shortcuts to the
management pages for the built-in Windows Defender virus/threat
protection and firewall product.
Activation
The Activation page shows current status. You can input a different
product key here too.
DEVICE SETTINGS
You can also use the icon in the Notification Area to control the
volume.
POWER OPTIONS
You can also set sleep timers for an individual component, such as
the display or hard drive, so that it enters a power-saving state if it
goes unused for a defined period.
One such option is defining what pressing the power button and/or
closing the lid of a laptop should perform (shut down, sleep, or
hibernate, for instance).
Configuring power settings via the Power Options applet in Control Panel. (Screenshot courtesy
of Microsoft.)
You can also use the Power Options applet to enable or disable
fast startup . This uses the hibernation file to instantly restore the
previous system RAM contents and make the computer ready for
input more quickly than with the traditional hibernate option.
In the Settings app, the Apps group is used to view and remove
installed apps and Windows Features. You can also configure which
app should act as the default for opening, editing, and printing
particular file types and manage which apps run at startup.
Apps & features settings can be used to uninstall software apps, add/remove Windows
features, and set default apps. (Screenshot courtesy of Microsoft.)
Mail applet configuration options for accounts and data files in the Microsoft Outlook email,
contact, and calendar client app. (Screenshot courtesy of Microsoft.)
Gaming
Internet Options
The Run dialog allows you to execute a command with switches. (Screenshot courtesy of
Microsoft.)
4. You are assisting a laptop user. While the user was away
from their desk, the laptop powered off. The user was in
the middle of working on a file and forgot to save
changes. Can you reassure the user and advise on the
best course of action?
Lesson 10
Summary
You should be able to use the Settings and Control Panel interfaces
to configure Windows for different business-, home-, and user-
requirements scenarios.
Managing Windows
LESSON INTRODUCTION
LESSON OBJECTIVES
If the device has never worked, check that it (or the driver installed)
is compatible with the OS. Manufacturers often release updated
drivers to fix known problems. The update can normally be
obtained as a download from the support area of the
manufacturer’s website. Once downloaded, the driver may come
with a setup program to install it or may need to be installed
manually.
If a device supports Plug and Play and is hot swappable, you can
remove it from the computer without having to uninstall it. Before
removing a storage device, close any applications that might be
using it, then select the Safely Remove Hardware icon in the
notification area on the taskbar, and choose the option to stop or
eject the device.
One of the disks (typically Disk 0) will be the one holding the
operating system. This disk will have at least three volumes:
● The system volume contains the files used to boot the OS.
This typically uses a boot system called extensible firmware
interface (EFI). It is not usually assigned a drive letter.
● The boot volume contains the operating system files and is
usually allocated the drive letter C:.
● Recovery partitions contain tools to repair a damaged
installation and/or return the computer to its factory state.
These can either contain the PC vendor’s tool or Microsoft’s
Windows Recovery Environment (WinRE). They are not usually
assigned drive letters.
Of all the computer’s subsystems, disk drives and the file system
probably require the most attention to keep in optimum working
order. File storage is subject to three main problems:
Disk Defragmenter
Disk Clean-up
The Disk Clean-up (cleanmgr.exe) tool tracks files that can be
safely erased to reclaim disk space. These files include ones
deleted but still available in the Recycle Bin and various temporary
files and caches. The tool can be run in administrator mode using
the Clean up system files option to reclaim data from caches such
as Windows Update and Defender.
Task Scheduler showing a Dell Support auto update task configured to run each week.
(Screenshot courtesy of Microsoft.)
Apart from defining the path to the file or script you want to
execute and defining a trigger, you should also enter the
credentials that the task will run under—if the selected user
account does not have sufficient permissions, the task will not run.
LOCAL USERS AND GROUPS
CONSOLE
Local Users and Groups console showing default security groups. Adding a user account as a
member of the Administrators group gives the account full privileges. (Screenshot courtesy of
Microsoft.)
The tool displays many subfolders, but the most widely used are:
Using Certificate Manager to view certificates for the current user. The trusted root certificates
added here allow the computer to trust any subject certificates issued by these CAs. Note that
as these are root certificates, each is issued to the organization by itself. (Screenshot courtesy
of Microsoft.)
GUI tools such as Settings and Control Panel make changes to user
profiles and the system configuration that are ultimately stored in
a database called the registry. However, the registry also contains
thousands of other settings that are not configurable via these
tools. The Group Policy Editor (gpedit.msc) provides a more
robust means of configuring many of these Windows settings than
editing the registry directly. Also, vendors can write administrative
templates to make third-party software configurable via policies.
Using Group Policy Editor to view the local password policy. This computer does not have a
strong set of policies. (Screenshot courtesy of Microsoft.)
Registry Keys
Registry root keys. Troubleshooting and editing activity is usually focused on either HKLM or
HKCU. (Screenshot courtesy of Microsoft.)
If you want to copy portions of the registry database and use them
on other computers, select File > Export Registry File. The file will
be exported in a registry-compatible format and can be merged
into another computer’s registry by double-clicking the file (or
calling it from a script).
CUSTOM MICROSOFT
MANAGEMENT CONSOLES
Adding a snap-in to a custom console. This custom console can be used to manage both
personal and computer certificates on the local host. (Screenshot courtesy of Microsoft.)
With a log file selected, the three-part middle pane lets you see the
details of the selected event without having to open a separate
dialog. The third pane contains useful tools for opening log files,
filtering, creating a task from an event, and so on.
Reviewing the System log in Windows 10 Event Viewer management console. (Screenshot
courtesy of Microsoft.)
Each log file has a default maximum size (usually about 20 MB), but
you can change this by selecting Properties on the appropriate
log. This option also allows the overwrite option to be set either as
overwrite, do not overwrite, or archive (close the current file and
start a new one).
There are many other logs stored under the Applications and
Services Logs node. You would investigate these when
troubleshooting a particular Windows feature, service, or third-
party application.
The shortcut menu for a process allows you to end a task. There is
also an option to search for information about the process online.
Another option is to view more information about a process via the
Details tab. For example, some background services run within the
context of a process wrapper. You can identify services associated
with each process via the shortcut menu on the Details tab.
Performance tab in Task Manager showing CPU utilization. (Screenshot courtesy of Microsoft.)
The CPU page shows the number of cores and logical processors
(HyperThreading), whether the system is multisocket, and whether
virtualization is enabled. The statistics show overall utilization,
system uptime, and a count of the number of processes, threads,
and handles. Higher numbers indicate more activity. Each process
can run operations in multiple threads and can open handles to
files, registry keys, network pipes, and so on.
High peak values for utilization are nothing to worry about, but
sustained periods of high utilization means that you should
consider adding more resources to the system (or run fewer
processes!).
Memory Monitoring
The Memory page reports which slots have modules installed and
the speed. The usage statistics are broken down as follows:
Disk Monitoring
The Disk pages report the type and capacity plus statistics for
active time, response time, and read/write speeds.
Note that utilization is measured across all disk devices. For
example, 50% utilization could mean one disk working at
100% and the other seeing no activity.
High disk utilization and slow response times are a common cause
of poor overall system performance issues. This could be a result
of slow HDD technology, excessive paging activity, file/cache
corruption, or a faulty device with bad sectors/blocks.
Network Monitoring
The Ethernet or Wi-Fi tab reports send and receive throughput for
the active network adapter plus the IP address and hardware
(MAC) interface address. If a wireless adapter is active, the SSID,
connection type (802.11 standard), and signal strength are also
shown.
TASK MANAGER USER
MONITORING
The Users tab lets you see the people who are logged on (and
allows you to send them a message or sign them out), the
information about the processes they are running, and the
resource utilization associated with their account.
The Startup tab lets you disable programs added to the Startup
folder (type shell:startup at the Run dialog to access this) or
set to run using the registry. Right-click the headers, and select
Startup type to show how the program is launched. It also shows
how much impact each item has on boot times.
Resource Monitor
Performance Monitor
Windows Performance Monitor (perfmon.msc) can be used to
provide real-time charts of system resources or can be used to log
information to a file for long-term analysis.
Saved log files can be loaded into Performance Monitor from the
Reports folder for analysis or exported to other programs.
PERFORMANCE COUNTERS
Using Performance Monitor to record three counters from the PhysicalDisk and Memory
objects. (Screenshot courtesy of Microsoft.)
The Boot tab lets you configure basic settings in the Boot
Configuration Data (BCD) store. You can change the default OS,
add boot options (such as Safe Mode boot) with minimal drivers
and services, and set the timeout value—the duration for which the
boot options menu is displayed. To add boot paths, you have to
use the bcdedit command.
You can also log boot events. This boot log file is saved to
%SystemRoot%\ntbtlog.txt . It is not shown in
Event Viewer.
The Services tab lets you choose specifically which services are
configured to run at startup. The date that a service was disabled is
also shown, to make troubleshooting easier. The Tools tab
contains shortcuts to various administrative utilities, including
System Information, Registry Editor, Performance Monitor, and so
on.
Review Activity:
Performance and
Troubleshooting Tools
You can run any command from the Run dialog. However, to input
a series of commands or to view output from commands, you need
to use the command shell. The cmd.exe shell processes the legacy
command set that has been part of Windows since its earliest
versions.
Trying to run a command that requires elevation. You must open a new command prompt
window as administrator. (Screenshot courtesy of Microsoft.)
You cannot continue within the same window. You need to open a
new command prompt as administrator. Right-click the command
prompt shortcut, select Run as administrator , and then confirm
the user access control (UAC) prompt. Alternatively, type cmd in
the Instant Search box, and then press CTRL+SHIFT+ENTER.
Command Syntax
Getting Help
The string before > in the command prompt shows the working
directory path. Commands will operate on the contents of the
working directory unless a different absolute or relative path is
specified as an argument.
Use the dir command to list the files and subdirectories from
either the working drive and directory or from a specified path.
You can present files in a particular order using the /o: x switch,
where x could be n to list by name, s to list by size, e to list by
extension, or d to list by date. The date field can be set by the
/t: x switch, where x is c for created on, a for last access, or w for
last modified.
You can use switches to include or exclude files and folders by their
attributes. Check the command help for additional switches and
syntax.
Despite the name, you can also use robocopy to move files
(/mov switch).
Creating a Directory
To create a directory, use the md command . For example, to
create a directory called Data in the current directory, type md
Data . To create a directory called Docs in a directory called Data
on the A drive, when the current path is C:\ , type md
A:\Data\Docs
Removing a Directory
The Disk Management snap-in is easy to use, but there are some
circumstances where you may need to manage volumes at a
command prompt.
There are too many options in diskpart to cover here, but the basic
process of inspecting disks and partitions is as follows:
chkdsk scans the file system and/or disk sectors for faults and can
attempt to repair any problems detected. A version of Check Disk (
autochk ) will also run automatically if the system detects file
system errors at boot.
While winver has its place, the About settings page is more
informative as it also lists the edition and license
information.
Review Activity: Command-
line Tools
Summary
You should be able to use management consoles and command-
line utilities to manage Windows users, devices, apps, and
performance.
LESSON INTRODUCTION
While the early lessons in this course have focused on Windows 10,
there is a much wider range of operating systems available. Even
with Windows, there are various editions to target different market
sectors. There are also operating systems designed to support
specific hardware types, such as mobile devices. Being able to
compare and contrast OS types, versions, and editions will prepare
you to support users in a variety of different environments.
LESSON OBJECTIVES
● Explain OS types.
● Compare Windows editions.
Topic 12A
Explain OS Types
Microsoft Windows
UNIX
Linux
Ubuntu Linux desktop with apps for package and file management open.
There are also “packaged” apps available for use offline, and
Chrome OS can run apps developed for Android.
IOS AND ANDROID
Apple iOS
iOS 15 running on an iPad. (Screenshot reprinted with permission from Apple Inc.)
Apple iPadOS
AndroidTM
FAT32
The FAT file system is a very early type named for its method of
organization—the file allocation table. The FAT provides links from
one allocation unit to another. FAT32 is a variant of FAT that uses a
32-bit allocation table, nominally supporting volumes up to 2 TB.
The maximum file size is 4 GB minus 1 byte.
While Linux and macOS provide some degree of support for FAT32
and NTFS as removable media, they use dedicated file systems to
format fixed disks.
Most Linux distributions use some version of the extended (ext) file
system to format partitions on mass storage devices. ext3 is a 64-
bit file system with support for journaling. ext4 delivers better
performance than ext3 delivers and would usually represent the
best choice for new systems.
Software Compatibility
Network Compatibility
Compatibility is also a consideration for how devices running
different operating systems can communicate on data networks.
Devices running different operating systems cannot “talk” to one
another directly. The operating systems must support common
network protocols that allow data to be exchanged in a standard
format.
Compare Windows
Editions
Desktop Styles
The Windows user interface (UI) is based around the desktop, Start
menu, taskbar, and notification area elements. These basic
desktop style elements have remained in place, but Windows
versions and feature updates sometimes introduce major and
minor changes. There are frequent changes to the design of the
Start menu, for instance, including its brief expansion into a screen
with live app tiles. As another example, feature update 1607
introduced support for dark themes, and subsequent updates have
tweaked the way dark versus light themes can be configured.
In a workgroup network, the PCs and laptops can share data and
communicate, but each machine and its user account database are
managed separately.
Windows Pro for Workstations has the same features as Pro but
supports more maximum RAM and advanced hardware
technologies, such as persistent system RAM (NVDIMM).
An in-place upgrade means that the setup program for the new
version is launched from within the current OS. The applications,
configuration settings, and data files should all be preserved as
long as they are compatible with the new version.
Upgrade Paths
If you are considering an in-place upgrade, you must check that the
current OS version is supported as an upgrade path to the
intended version. The OS vendor should publish supported
upgrade paths on its website. For example, the upgrade paths for
Windows 10 are published here: docs.microsoft.com/en-
us/windows/deployment/upgrade/windows-10-upgrade-paths .
Summary
You should be able to explain differences between OS types,
versions, and editions to identify a suitable choice of OS for a given
scenario.
Supporting Windows
LESSON INTRODUCTION
LESSON OBJECTIVES
Perform OS Installations
and Upgrades
Note that you can only upgrade the same type of operating
system. You cannot “upgrade” from Windows to Linux, for
instance.
Upgrade Considerations
1. Check hardware compatibility—You must make sure that
the CPU, chipset, and RAM components of the computer are
sufficient to run the OS. PC operating systems now often
require a 64-bit CPU, for example. New versions often have
higher RAM requirements than older software.
2. Check application and driver support/backward
compatibility—Most version upgrades try to maintain
support for applications and device drivers that were
developed for older versions. When performing an in-place
upgrade, any incompatible software or hardware should be
uninstalled before attempting an in-place upgrade. If the
existing app or driver is not directly compatible, the vendor
might have produced a new version that can be reinstalled
after the upgrade. Incompatible apps and devices will have to
be replaced with new alternatives.
Feature Updates
The Windows System Image Manager is used to configure answer files. An answer file contains
the information input during setup, such as product key, disk partitions, computer name,
language and network settings (including whether to join a domain or workgroup), and so on.
(Screenshot courtesy of Microsoft.)
The installation boot method refers to the way in which the setup
program, answer file (if used), and OS files or system image are
loaded onto the target PC. You may need to access the computer’s
firmware setup program to ensure that a particular boot method is
available, enabled, and set to the highest priority.
Optical Media
Network Boot
Internet-Based Boot
Once the OS has been installed, you will usually want to set the
internal hard drive as the default (highest priority) boot device, and
disable any other boot devices. This ensures the system doesn’t try
to boot to the setup media again. If access to the firmware setup
program is secured, it also prevents someone from trying to install
a new OS without authorization.
A mass storage device or fixed disk, such as hard disk drive (HDD)
or solid-state drive (SSD), requires partitioning and formatting
before it can be used. Partition and file system options can be
chosen by responding to prompts in the setup program,
configured in an answer file, or built into an image that is cloned to
the target disk.
MBR-Style Partitioning
When the disk uses MBR partitioning, the system firmware must be
set to use the legacy BIOS boot method. If the boot method is set
to UEFI, the disk will not be recognized as a boot device.
GPT-Style Partitioning
When the disk uses GPT partitioning, the system firmware must be
set to use the UEFI boot method. If the boot method is set to BIOS,
the disk will not be recognized as a boot device.
Drive Format
Recovery Partition
The main disadvantages with OEM recovery media are that the tool
only works if the original hard disk is still installed in the machine
and will not include patches or service packs applied between the
ship date and recovery date. The recovery image also takes up
quite a lot of space and users may not feel that they are getting the
disk capacity that they have paid for!
Reset Windows
Windows supports refresh and reset options to try to repair the
installation. Using refresh recopies the system files and reverts
most system settings to the default but can preserve user
personalization settings, data files, and apps installed via Windows
Store. Desktop applications are removed.
Using the full reset option deletes the existing OS plus apps,
settings, and data ready for the OS to be reinstalled.
Review Activity: OS
Installations and Upgrades
This computer’s graphics adapter does not meet the minimum specification, so setup cannot
proceed. (Screenshot courtesy of Microsoft.)
Impact to Business
Impact to Operation
Troubleshoot Windows OS
Problems
With a legacy BIOS, the firmware scans the disk identified as the
boot device and reads the master boot record (MBR) in the first
sector of the disk. The MBR identifies the boot sector for the
partition marked as active. The boot sector loads the boot
manager, which for Windows is BOOTMGR.EXE. The boot manager
reads information from the boot configuration data (BCD) file,
which identifies operating systems installed on the computer.
BOOTMGR and the BCD are normally installed to a hidden System
Reserved partition.
With an EFI boot, the initial part of the boot process is different.
Following POST, the firmware reads the GUID partition table (GPT)
on the boot device.
The GPT identifies the EFI System Partition. The EFI system
partition contains the EFI boot manager and the BCD. Each
Windows installation has a subfolder under \EFI\Microsoft\ that
contains a BCD and BOOTMGFW.EFI.
If you don’t have the product media, you can make a system repair
disk from Windows using the Create a recovery drive setting. You
need to have done this before the computer starts failing to boot
or create one using a working Windows installation.
Once in the recovery environment, select the Troubleshoot menu
and then Advanced options . If the boot files are damaged, you
can use the Startup Repair option to try to fix them. You can also
launch System Restore or restore from an image backup, perform
a refresh, or reset reinstallation of Windows from here. The last
two options are to run a memory diagnostic and to drop into the
Windows Recovery Environment (WinRE) command prompt,
where you could run commands such as diskpart , sfc ,
chkdsk , bootrec , bcdedit , or regedit to try to repair
the installation manually.
System Restore does not restore (or delete) user data files.
Use the System Protection tab (opened via the advanced System
settings) to select which disk(s) to enable for system restore and
configure how much disk capacity is used. The disk must be
formatted with NTFS, have a minimum of 300 MB free space, and
be over 1 GB in size.
If an update causes problems, you can try to uninstall it. You might
be able to use System Restore to do this. Otherwise, open the
Programs and Features applet and select View installed updates
. Select the update, and then select the Uninstall button.
If System Restore or Startup Repair does not work and you cannot
boot to a logon, you will have to use a system repair tool or
possibly a reinstall option and restore from data backup
(presuming you have made one). The various versions of Windows
use different system recovery tools and backup processes.
You create a system image using the Backup and Restore applet
in Control Panel . Select the Create a system image link in the
tasks pane.
To recover the system using the backup image, use the Advanced
Boot Option or the System Image Recovery option off a repair
disk or recovery environment.
Reinstalling Windows
No OS Found
You could also use diskpart to ensure that the system partition
is marked as active and that no other partitions have been marked
as active.
If Windows appears to boot but does not display the sign-in screen
or does not load the desktop following logon, the likely cause is
corruption of drivers or other system files. If the system will boot to
a GUI in Safe Mode, then replace the graphics adapter driver. If the
system will not boot to a GUI at all, then the Windows installation
will probably have to be repaired or recovered from backup. It is
also possible that the boot configuration has been changed
through msconfig and just needs to be set back.
If Windows does boot, but only slowly, you need to try to identify
what is happening to delay the process. You can enable verbose
status messages during the Windows load sequence by configuring
a system policy or applying a registry setting to enable Display
highly detailed status messages .
If the system is slow to load the desktop following sign-in, the issue
could be a corrupt user profile. The registry settings file
NTUSER.DAT is particularly prone to this. Rebuilding a local user
profile means creating a new account and then copying files from
the old, corrupt profile to the new one, but excluding the following
files: NTUSER.DAT, NTUSER.DAT.LOG, and NTUSER.INI.
TROUBLESHOOT
PERFORMANCE ISSUES
● Use System Restore or (if you can boot to Safe Mode) driver
rollback, or update rollback to restore the system to a
working state.
● Remove a recently added hardware device, or uninstall a
recently installed program.
● Check seating of hardware components and cables.
● Run hardware diagnostics, chkdsk, and scan for malware.
● Check fans and chassis vents for dust and clean if necessary.
● Make a note of the stop error code (which will be in the form:
Stop: 0x0…), and search the Microsoft Knowledge Base
(support.microsoft.com/search) for known fixes and
troubleshooting tips. The various newsgroups accessible from
this site offer another valuable source of assistance.
Blue Screen of Death (BSoD). (Screenshot courtesy of Microsoft.)
If errors are found, first check that all the memory modules are
correctly seated. Remove all the memory modules but one and
retest. You should be able to identify the faulty board by a process
of elimination. If a known-good memory module is reported faulty,
the problem is likely to lie in the motherboard.
If you suspect file system corruption, use sfc C: to scan the boot
volume. If the tool reports errors, run sfc C: /f to attempt
repairs.
USB Issues
If there are issues with USB devices not working after connection,
not working after the computer resumes from sleep/hibernation,
or generating warning messages, make sure the controllers are
using the latest driver:
Applications Crashing
Time Drift
Processes such as authentication and backup depend on the time
reported by the local PC being closely synchronized to the time
kept by a server. Some authentication systems are intolerant of 30
or 60 second discrepancies.
Summary
You should be able to support diverse operating system and
application software deployments by applying appropriate
considerations and troubleshooting processes.
Managing Windows
Networking
LESSON INTRODUCTION
Once you have the computer network up and running, you can
start to configure it to provide useful services. File and print
sharing are key uses of almost every network. When configuring
these resources, you must be aware of potential security issues
and understand how to set permissions correctly to ensure that
data is only accessible to those users who really should have been
authorized to see it.
LESSON OBJECTIVES
In this lesson, you will:
Manage Windows
Networking
Wi-Fi properties for the adapter are configured via Device Manager.
The most important setting on a wireless card is support for the
802.11 standard supported by the access point. Most cards are set
to support any standard available. This means that a card that
supports 802.11n will also be able to connect to 802.11g and
802.11b networks. You can also adjust parameters such as roaming
aggressiveness and transmit power to address connection issues.
All hosts on the same local network must use addresses from
within the same range. Hosts with addresses in different ranges
can only be contacted by forwarding the packet via a router. Each
host must be configured with the IP address of a local router. This
is referred to as the default gateway.
● Client for Microsoft Networks and File and Print Sharing for
Microsoft Networks software.
● Internet Protocol—Both IP version 4 and IP version 6 will be
installed. The network adapter automatically uses the
appropriate version of the protocol depending on the
network it is connected to.
● Link-layer Topology Discovery—This protocol provides
network mapping and discovery functions for networks
without dedicated name servers.
You can also adjust the IP configuration via the settings app. In this
dialog, you need to enter the mask as a prefix length in bits. A
255.255.255.0 mask is 24 bits.
Using Network & Internet settings to configure static addressing. In this dialog, you need to
enter the mask as a prefix length rather than a dotted decimal mask. (Screenshot courtesy of
Microsoft.)
NETWORK LOCATION
Use Network & Internet settings to change the location defined for
a network.
Using Network & Internet settings to change the network profile. (Screenshot courtesy of
Microsoft.)
Setting the firewall state via the Windows Security Center. (Screenshot courtesy of Microsoft.)
To allow or block programs (configure exceptions), from the
Windows Firewall status page, select Allow an app through the
firewall . Check the box for either or both network profile types or
use Allow another program to locate its executable file and add it
to the list.
Using the Settings app to apply a manual proxy setup. (Screenshot courtesy of Microsoft.)
Review Activity: Windows
Networking
● IP: 192.168.1.1
● Mask: 255.255.255.0
● Gateway: 192.168.1.0
● DNS: 192.168.1.0
Troubleshoot Windows
Networking
Windows can report several types of error state for a local network
adapter. If the connection is reported as unplugged or
disconnected, you need to check the cable or wireless network
configuration. Two other states are reported if the link is available,
but IP is not correctly configured:
ipconfig Command
ipconfig /displaydns
ipconfig /flushdns
hostname Command
Network Reset
Using tracert in Windows. The first probe is for the host’s default gateway (a SOHO router
appliance). The second probe is to Google’s public DNS resolver. The hops take the packet from
the local gateway via an ISP’s network to Google’s Internet routers and servers. Note that
probes to one of the routers have timed out. This does not mean that the connection failed,
just that the router is configured not to respond to probes. (Screenshot courtesy of Microsoft.)
If the host cannot be located, the command will eventually timeout,
but it will return every router that was attempted. The output
shows the number of hops (when a packet is transferred from one
router to another), the ingress interface of the router or host (that
is, the interface from which the router receives the probe), and the
time taken to respond to each probe in milliseconds (ms). If no
acknowledgement is received within the timeout period, an
asterisk is shown against the probe.
Using nslookup to query the mail server configured for the comptia.org domain name using
Google’s public DNS servers (8.8.8.8). (Screenshot courtesy of Microsoft.)
If you query a different name server, you can compare the results
to those returned by your own name server. This might highlight
configuration problems.
TROUBLESHOOT NETWORK
PORTS
Configure Windows
Security Settings
Implicit Deny
Least Privilege
A complementary principle to implicit deny is that of least
privilege . This means that a user should be granted the minimum
possible rights necessary to perform the job. This can be complex
to apply in practice, however. Designing a permissions system that
respects the principle of least privilege while not generating too
many support requests from users is a challenging task.
USER AND GROUP ACCOUNTS
Security Groups
Built-in groups are given a standard set of rights that allow them to
perform appropriate system tasks.
You can also manage accounts at the command line using net
user. You need to execute these commands in an administrative
command prompt.
● Add a new user account and force the user to choose a new
password at first login:
Multifactor Authentication
2-step Verification
Authenticator Application
Windows Hello
Configuring Windows Hello sign-in options. This PC has the PIN method set up, but it does not
have a fingerprint reader or a camera with infrared (IR) to produce a facial template that will
be resistant to spoofing. (Screenshot courtesy of Microsoft.)
Single Sign-On
The advantage of SSO is that each user does not have to manage
multiple digital identities and passwords. The disadvantage is that
compromising the account also compromises multiple services.
The use of passwords in SSO systems has proven extremely
vulnerable to attacks.
Domain Controllers
Member Servers
A member server is any server-based system that has been joined
to the domain but does not maintain a copy of the Active Directory
database. A member server provides file and print and application
server services, such as Exchange for email or SQL Server for
database or line-of-business applications. AD uses the Kerberos
protocol to provision single sign-on authentication and
authorization for compatible applications and services.
Security Groups
Login Scripts
The MDM software logs the use of a device on the network and
determines whether to allow it to connect or not, based on
administrator-set parameters. When the device is enrolled with the
management software, it can be configured with policies to allow
or restrict use of apps, corporate data, and built-in functions, such
as a video camera or microphone.
Configuring iOS device enrollment in Microsoft’s Intune Enterprise Mobility Management (EMM)
suite. (Screenshot courtesy of Microsoft.)
Review Activity: Windows
Security Settings
Joining a Workgroup
Viewing devices in a workgroup network. The COMPTIA and COMPTIA-LABS hosts are both
enabled for file sharing. The LaserJet 200 printer listed here is connected directly to the
network. (Screenshot courtesy of Microsoft.)
Mapped Drives
There are several net and net use command utilities that you
can use to view and configure shared resources on a Windows
network. A few of the commands are provided here, but you can
view the full list by entering net /?
net view
The Security tab shows the ACL applied to the file or folder. Each
access control entry (ACE) assigns a set of permissions to a
principal. A principal can either be a user account or a security
group. The simple permissions are as follows:
Putting explicit deny permissions to one side, the user obtains the
most effective allow permissions obtained from any source. For
example, if membership of a “Sales” group gives the user Read
permission and membership of a “Managers” group gives the user
Modify permission, the user’s effective permission is Modify .
To use services in the domain, the user must sign in to the PC using
a domain account. The Other user option in the sign-in screen will
provide a domain option if it is not the default. You can also enter a
username in the format Domain\Username to specify a
domain login.
Signing in to a domain. (Screenshot courtesy of Microsoft.)
When the user signs in, the home folder appears under This PC with the allocated drive letter:
(Screenshot courtesy of Microsoft.)
When the user signs in, the home folder appears under This PC
with the allocated drive letter:
Using the home folder location to save a file. (Screenshot courtesy of Microsoft.)
ROAMING PROFILES AND
FOLDER REDIRECTION
Summary
You should be able to manage and troubleshoot Windows network
settings, configure users and share permissions in workgroup
environments, and summarize Active Directory/domain concepts.
LESSON INTRODUCTION
LESSON OBJECTIVES
The kernel is the software component that provides the core set of
operating system functions. These include features for managing
system hardware and for communicating between software and
hardware. A distribution or distro is the Linux kernel plus a
distinctive type of package manager and software repository with a
selection of customizable shells, utilities, and applications. Distros
also have either community-supported or commercial licensing
and support options.
● stdin (0) takes the user’s keyboard input and writes it as data
to the tty device for processing by the shell’s command
interpreter.
● stdout (1) reads data generated by the shell from the tty
device and displays it through the terminal.
● stderr (2) carries error information.
Desktop Environments
Console Switching
You can issue more than one command on a single line by placing
a semicolon ( ; ) between the commands. When you press ENTER,
the commands execute sequentially.
Case Sensitivity
Commands, parameters, and file and directory names are all case
sensitive in Linux. For example, ls -l file.data and ls -L
File.data would produce completely different results. Using
capitals in the command name would generate an error message.
Help System
Alternatively, you can use man to view the help pages for a
particular command. For example, use man man to view the help
pages for the man command!
File Editors
Most Linux files use a plain text format and can easily be edited
directly. There are numerous text file editors. The Nano text editor
is a basic example often preferred by those coming from a
Windows environment. To open or create a file, use nano
filepath or nano -l filepath to show line numbers. You
can use the cursor keys to move around the text. Editor and file
operations are completed using CTRL + key shortcuts. For
example, CTRL+O writes changes to the file and CTRL+X quits the
editor.
When Linux boots, a system kernel and virtual file system are
loaded to a RAM drive. The unified file system identifies the
location of the persistent root partition from the appropriate
storage device and loads the file system stored on the disk.
Unlike Windows, Linux does not use drive letters like C: or D:. The
unified file system starts at the root, represented by /. Directories
and subdirectories can be created from the root to store files.
Linux’s file system hierarchy standard (FHS) specifies how the
directories under root should be named and where types of files
should be placed. For example, the /home directory contains
subdirectories for each user to store personal data and the /etc
directory contains configuration files.
Viewing the root directory and file system hierarchy standard (FHS) subdirectories in Ubuntu
Linux.
The core commands that you should know to navigate the Linux
file system include pwd, cd, ls, and cat.
pwd Command
cd Command
cd /etc
cd documents
cd ..
ls Command
ls -la /etc
cat Command
You can use these redirection operators with other commands too.
SEARCH COMMANDS
find Command
The find command is used to search for files. The basic syntax is
find path expression , where path is the directory in
which to start the search and expression is the data to match. An
option is used to determine what the expression should search on,
such as -name , -size , -user (owner), or -perm
(permissions). The -type option locates classes of files, but where
Windows file types are defined by extensions, in Linux, type
distinguishes files, directories, block devices (disks), network
sockets, symbolic links, and named pipes.
grep Command
cp Command
cp file1.txt file1.old
● Copy the file hosts from the directory /etc into the
directory /tmp , keeping the file name the same:
cp /etc/hosts /tmp
● Copy all files beginning with the name message from the
/var/log directory into /home/david. The -v option
displays the files copied:
cp -v /var/log/message* /home/david
mv Command
mv /home/david/data.txt /tmp
mv alarm.dat /tmp/alarm.bak
mv /var/log/app1.dat /var/log/app1.old
rm Command
rm data.old
rm /var/log/*.bak
rm -r /home/david/data
df and du Commands
The df and du commands check free space and report usage by
the device, directory, or file specified as the argument:
su Command
sudo Command
The sudo (superuser do) command allows any account listed in the
/etc/sudoers file user to run specified commands with
superuser privilege level. In distributions that use sudo, this
process is handled by guided setup. The user enters the sudo
command followed by the command the user wishes to run. The
user might be asked to confirm his or her password if it has not
been cached recently.
A user can belong to many groups but can only have one effective
group ID at any one time. The effective group ID is listed for the
user account in /etc/passwd and can be changed using the
newgrp command.
FILE PERMISSIONS COMMANDS
For each object, these permissions are set for the owner, for the
group the owner belongs to or that the object has been assigned
to, and for other users (“the world”). Using symbolic notation, each
permission is allowed (r or w or x) or denied (-).
● The leading zero identifies the value as an octal but can often
be omitted.
● 7 in the first position grants all rights to the owner:
4(r)+2(w)+1(x).
● 5 in the second position grants read and execute to the
group: 4(r)+0+1(x).
● 4 in the third position grants read to world: 4(r)+0+0.
chmod Command
chown Command
The command chown allows the superuser to change the owner of
a file or directory. Note that this right is reserved to superuser or
sudoer. Even if a regular user owns a file, they cannot use chown .
The file owner can change the group using the chgrp command.
PACKAGE MANAGEMENT
COMMANDS
apt-get Command
apt-get update
apt-get upgrade
yum Command
yum check-update
yum update
Antivirus
This does not mean that Linux is risk-free, however, and each
installation should be assessed for security controls to suit the use
to which it is put. There have been several high-profile cases of
either Trojans or serious vulnerabilities in software distributed
through repositories or in popular third-party tools. Any high value
target could be subject to specific, targeted attacks against it.
Where Linux is used as the platform for a web server, for instance,
it is imperative to configure appropriate security controls. Products
such as Clam AntiVirus (ClamAV) and the Snort Intrusion
Prevention System (IPS) can be used to block varied malware
threats and attempts to counteract security systems. Though now
owned by Cisco, both ClamAV and Snort are open-source products
made freely available under the General Public License (GPL).
ps Command
Listing all processes on the system. Note that a question mark indicates that a process has no
controlling terminal.
top Command
Like ps, the top command lists all processes running on a Linux
system. It acts as a process management tool by enabling you to
prioritize, sort, or terminate processes interactively. It displays a
dynamic process status, reflecting real-time changes.
ip Command
dig Command
Samba
Linux does not have an “official” backup tool. You could create a
custom backup solution using the cron task scheduler and file copy
scripts. Backup could also use compression utilities, such as tar
or gzip . There are plenty of commercial and open-source backup
products for Linux, however. Some examples include Amanda,
Bacula, Fwbackups, and Rsync.
crontab –l
crontab -r
The basic syntax for scheduling a job using crontab includes the
following:
This would cause the system to run the rsync backup program at
2:15 a.m. on a Friday (day 5), synchronizing the /home/sam
directory with the /mount/sync folder (which could be a mount
point to an external backup device).
Review Activity: Features
of Linux
Mac computers from Apple use the macOS operating system. Mac
users tend to be found in art, music, graphic design, and education
because macOS includes apps geared to those audiences. In this
topic, you will examine some of the important features and
functions of macOS.
INTERFACE FEATURES
If you are using an Apple Mac computer for the first time, you will
notice that the desktop and user interface is like a Windows-based
PC in some respects but different in others. As with Windows, a
Mac boots to a graphical desktop environment. Any apps that have
been installed and configured to launch at boot will also start.
At the top of the screen is the menu bar. This is always present
with all apps, but the menu titles change to show commands for
the active window.
Menu bars with different apps running. (Screenshot reprinted with permission from Apple Inc.)
To the left of the menu bar is the Apple menu. This can be used to
report support information (About) and log out or shut down the
computer.
Dock
The dock at the bottom of the screen gives one-click access to your
favorite apps and files, similar to the taskbar in Windows. Apps that
are open in the dock display a dot below the icon.
Spotlight Search
Terminal
The Terminal can be used to access the command-line
environment, which uses either the Z shell (zsh) or Bash. Older
macOS versions use Bash, while zsh is the default from Catalina up.
Mission Control is used to switch between windows and manage multiple desktops.
(Screenshot reprinted with permission from Apple Inc.)
SYSTEM PREFERENCES
Apple Keyboards
Where PC and Linux keyboards use CTRL, ALT , ALTGR , and START
modifier keys, Mac keyboards have an APPLE/POWER key and
COMMAND , OPTION , and CONTROL keys. COMMAND is closest
to the CTRL key in terms of functionality, and OPTION is usually
mapped to ALT .
Configuring the trackpad. (Screenshot reprinted with permission from Apple Inc.)
Displays
The Displays prefpane allows you to scale the desktop, set the
brightness level, calibrate to a given color profile, and configure
Night Shift settings to make the display adapt to ambient light
conditions.
Accessibility
Accessibility prefpane showing Zoom options. (Screenshot reprinted with permission Apple Inc.)
SECURITY AND USER
MANAGEMENT
Apple ID
You can sign in and out of your Apple ID using the button on the
System Preferences home page.
The Sign In button in System Preferences allows you to link an Apple ID to the local account.
(Screenshot reprinted with permission from Apple Inc.)
Security & Privacy prefpane showing privacy options. (Screenshot reprinted with permission
from Apple Inc.)
FileVault
As with Windows, a Mac can store files on local drives, but cloud
storage can represent a more secure option and make it easier to
synchronize data between devices.
Finder
iCloud
There are two main distribution mechanisms for macOS apps: the
App Store and app downloads.
The App Store provides a central portal for Apple and developers
to distribute free and paid-for software. It is also used to distribute
updates to macOS and new releases of the operating system.
Access to the App Store is mediated by an Apple ID.
Monitoring the App Store for available updates. (Screenshot reprinted with permission from
Apple Inc.)
Microsoft Office, Adobe Creative Cloud, and Skype are just three
examples of apps that are not available in the App Store. To install
any of these apps, it is necessary to download them from the
vendor site, ensuring that you select the macOS version.
By default, macOS will only allow apps to be installed that have
been downloaded from the Mac App Store. To allow the installation
of download apps, go to System Preferences > Security &
Privacy. Select the padlock to make changes to the settings—you
will need to enter the Administrator password to continue.
● DMG (disk image) format is used for simple installs where the
package contents just need to be copied to the Applications
folder.
● PKG format is used where app setup needs to perform
additional actions, such as running a service or writing files to
multiple folders.
Antivirus
Corporate Restrictions
Software Update prefpane showing that a macOS version upgrade is available. (Screenshot
reprinted with permission from Apple Inc.)
Network
You can manage network settings either from the Status menu on
the right-hand side of the menu bar or via System Preferences.
Status menus in the Menu bar. (Screenshot reprinted with permission from Apple Inc.)
Use the Printers & Scanners prefpane to add and manage print
and scan devices.
Disk Utility
The Disk Utility app can be used to verify or repair a disk or file
system. It can also be used to erase a disk with security options in
case you are selling or passing on a Mac.
Use the Disk Utility to report storage status and configure and format volumes. (Screenshot
reprinted with permission from Apple Inc.)
Configuring Time Machine. (Screenshot reprinted with permission from Apple Inc.)
macOS comes with several tools to troubleshoot app, OS, and data
issues.
Recovery Menu
macOS includes a set of utilities that you can use to restore a Mac
from the Time Machine backup program, reinstall macOS from a
system image, or reformat or repair the system disk.
When you reboot an Apple Mac, if the startup drive is not available
for any reason and it’s connected to the Internet, the computer will
try to boot from a web-based drive.
Summary
You should be able to identify features of Linux and macOS to help
support diverse OS environments.
Configuring SOHO
Network Security
LESSON INTRODUCTION
LESSON OBJECTIVES
Non-compliant Systems
Unprotected Systems
A baseline will recommend specific technical security controls to
ensure a secure configuration. Examples of these controls include
antivirus scanners, network and personal firewalls, and intrusion
detection systems. An unprotected system is one where at least
one of these controls is either missing or improperly configured.
This increases the system’s attack surface and potentially exposes
more vulnerabilities.
Impersonation
Do you really know who’s on the other end of the line? (Photo by Uros Jovicic on Unsplash.)
Dumpster Diving
Shoulder Surfing
Example of a phishing email. On the right, you can see the message in its true form as the mail
client has stripped out the formatting (shown on the left) designed to disguise the nature of the
links. (Screenshot courtesy of CompTIA.)
Footprinting Threats
Spoofing Threats
A spoofing threat is any type of attack where the threat actor can
masquerade as a trusted user or computer. Spoofing can mean
cloning a valid MAC or IP address, using a false digital certificate,
creating an email message that imitates a legitimate one, or
performing social engineering by pretending to be someone else.
On-path Attacks
Using a command & control (C&C) network to operate a botnet of compromised hosts and
coordinate a DDoS attack.
PASSWORD ATTACKS
Users viewing the post will have the malicious script hook.js
execute in their browser.
SQL INJECTION ATTACKS
If a threat actor enters the string ‘ or 1=1— and this input is not
sanitized, the following malicious query will be executed:
The logical statement 1=1 is always true, and the —# string turns
the rest of the statement into a comment, making it more likely
that the web application will parse this modified version and dump
a list of all users.
HASHING AND ENCRYPTION
CONCEPTS
Cryptographic Hashes
Symmetric Encryption
Asymmetric Encryption
A key pair can be used the other way around. If the private
key is used to encrypt something, only the public key can
then decrypt it. The point is that one type of key cannot
reverse the operation it has just performed.
Digital Signatures
Key Exchange
The sender uses the recipient’s public key to encrypt a secret key.
The recipient uses the private key to retrieve the secret key and
then uses the secret key to decrypt whatever data message was
transmitted by the sender. In this context, the symmetric cipher
secret key is also referred to as a session key. If it is changed often,
it is also referred to as an ephemeral key.
Review Activity: Attacks,
Threats, and
Vulnerabilities
You must make sure that the devices attached to your network are
only being operated by authorized users, especially when users can
connect wirelessly. Understanding the types of wireless security
protocols and authentication methods will help you to configure
secure network settings.
WI-FI PROTECTED ACCESS
WPA2
Neither WEP nor the original WPA version are considered secure
enough for continued use. Even with TKIP, WPA is vulnerable to
various types of replay attack that aim to recover the encryption
key. WPA2 uses the Advanced Encryption Standard (AES) cipher
deployed within the Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol (CCMP) . AES replaces
RC4 and CCMP replaces TKIP. CCMP provides authenticated
encryption, which is designed to make replay attacks harder.
WPA3
1. Both the server and the wireless supplicant are issued with an
encryption key pair and digital certificate.
2. On the wireless device, the private key is stored securely in a
trusted platform module (TPM) or USB key. The user must
authenticate with the device using a PIN, password, or bio
gesture to allow use of the key. This is the first factor.
3. When the device associates with the network and starts an
EAP session, the server sends a digital signature handshake
and its certificate.
4. The supplicant validates the signature and certificate and if
trusted, sends its own handshake and certificate. This is the
second factor.
5. The server checks the supplicant’s handshake and certificate
and authenticates it if trusted.
Configuring Network Policy Server to authenticate wireless clients using 802.1X EAP-TLS.
(Screenshot courtesy of Microsoft.)
RADIUS
TACACS+
Kerberos
In theory, an access point could allow a user to authenticate
directly to a directory server using the Kerberos protocol. On
Windows networks, Kerberos allows a user account to authenticate
to a domain controller (DC) over a trusted local cabled segment.
Kerberos facilitates single sign-on (SSO). As well as authenticating
the user on the network, the Kerberos server issues authorization
tickets that give the user account rights and permissions on
compatible application servers.
You should keep the firmware and driver for the home router up
to date with the latest patches. This is important because it allows
you to fix security holes and support the latest security standards,
such as WPA3. To perform a firmware update, download the
update from the vendor’s website, taking care to select the correct
patch for your device make and model. In the management app,
select the Firmware Upgrade option and browse for the firmware
file you downloaded.
Make sure that power to the device is not interrupted during the
update process.
Service Set ID
Hiding the SSID does not secure the network; you must
enable encryption. Even when broadcast is disabled, the
SSID can still be detected using packet sniffing tools and Wi-
Fi analyzers.
Encryption Settings
The encryption or security option allows you to set the
authentication mode. You should set the highest standard
supported by the client devices that need to connect.
Configuring security settings on a TP-LINK home router. This configuration allows WPA
compatibility mode, which is less secure. (Screenshot courtesy of TP-Link.)
For each radio frequency band (2.4 GHz, 5 GHz, and 6 GHz), there
will be an option to autoconfigure or select the operating channel.
If set to auto-detect, the access point will select the channel that
seems least congested at boot time. As the environment changes,
you may find that this channel selection is not the optimum one.
You can use a Wi-Fi analyzer to identify which channel within the
access point’s range is least congested.
HOME ROUTER FIREWALL
CONFIGURATION
All home routers come with at least a basic firewall, and some
allow advanced filtering rules. Any firewall operates two types of
filtering:
Hosts on the Internet can only “see” the router’s WAN interface and
its public IP address. Hosts on the local network are protected by
the default block rule on the firewall. If you want to run some sort
of server application from your network and make it accessible to
the Internet, you must configure a port forwarding rule.
Port forwarding means that the router takes a request from an
Internet host for a particular service (for example, the TCP port
25565 associated with a Minecraft server) and sends the request to
a designated host on the LAN. The request could also be sent to a
different port, so this feature is often also called port mapping .
For example, the Internet host could request Minecraft on port
25565, but the LAN server might run its Minecraft server on port
8181.
Configuring port forwarding for FTP on a TP-LINK home router via its Virtual Servers feature.
(Screenshot courtesy of TP-Link.)
There is nothing to configure when enabling UPnP, but when client devices use the service, the
rules they have configured on the firewall are shown in the service list. (Screenshot courtesy of
TP-Link.)
Most home routers come with only basic firewall functionality. The
firewall in a typical home router screens the local network rather
than establishing a screened subnet.
However, you should be aware of the way that many home router
vendors use the term DMZ. On a home router, a “DMZ” or ” DMZ
host ” configuration is likely to refer to a computer on the LAN that
is configured to receive communications for any ports that have
not been forwarded to other hosts. When DMZ is used in this
sense, it means “not protected by the firewall” as the host is fully
accessible to other Internet hosts (though it could be installed with
a host firewall instead).
Summarize Security
Measures
Perimeter Security
From the site perimeter, people should enter and leave the
building through defined entry and exit points. There may be a
single entrance or separate entrances for visitors and for staff. The
main problem with a simple door as an entry mechanism is that it
cannot accurately record who has entered or left an area. More
than one person may pass through the gateway at the same time;
a user may hold a door open for the next person; an unauthorized
visitor may tailgate behind an authorized employee. This risk may
be mitigated by installing a turnstile or an access control vestibule.
An access control vestibule is where one gateway leads to an
enclosed space protected by another barrier. This restricts access
to one person at a time.
Magnetometers
Security Guards
Equipment Locks
Summary
You should be able to explain common social-engineering attacks,
threats, and vulnerabilities; configure appropriate wireless security
protocol/authentication and firewall settings on a SOHO network;
and summarize physical security measures.
LESSON INTRODUCTION
LESSON OBJECTIVES
Configure Workstation
Security
Password Rules
The following rules are easy for users to apply and make
passwords more difficult to crack:
Using the local Group Policy editor to view password policies. (Screenshot courtesy of
Microsoft.)
BIOS/UEFI Passwords
Using the Properties dialog box to unlock a user account. (Screenshot courtesy of Microsoft.)
Even with UAC and execution control, there are still plenty of ways
for malware to install onto a PC. A program might use particularly
effective social engineering techniques to persuade the user to
bypass the normal checks. The malware might exploit a
vulnerability to execute without explicit consent. Malware might
also not need to install itself to achieve threat-actor objectives,
such as exfiltrating data weakening the system configuration or
snooping around the network.
The Real-time protection setting can be toggled off to disable Windows Defender Antivirus
temporarily. (Screenshot courtesy of Microsoft.)
From the main Advanced Firewall console, you enable, disable, and
configure rules by selecting in the Inbound Rules or Outbound
Rules folder as appropriate.
Configuring inbound filtering rules in Windows Firewall with Advanced Security. (Screenshot
courtesy of Microsoft.)
ENCRYPTING FILE SYSTEM
Folders and files that have been encrypted can be shown with
green color coding in Explorer. Any user other than the one who
encrypted the file will receive an “Access Denied” error when trying
to browse, copy, or print the file.
A file that has been encrypted cannot be opened by other users—even administrators.
(Screenshot courtesy of Microsoft.)
Configuring BitLocker and BitLocker To Go via the Control Panel. (Screenshot courtesy of
Microsoft.)
When the data is encrypted, the user must have access to the
encryption key to access it. BitLocker can make use of a trusted
platform module (TPM) chip in the computer to tie use of a fixed
disk to a particular motherboard. The TPM is used as a secure
means of storing the encryption key and to ensure the integrity of
the OS used to boot the machine. Alternatively, the key could be
stored on a removable smart card or on a USB stick. The
computer’s firmware must support booting from USB for the last
option to work.
The web browser has become one of the most important types of
software on a computer. As well as viewing basic sites, it is
frequently used as the interface for many types of web/cloud apps.
Browsers often work in a protected sandbox and need to be
managed almost like a secondary OS. Understanding the
installation and configuration issues will enable you to provision a
secure platform for users to access cloud- and web-based services.
BROWSER SELECTION AND
INSTALLATION
Trusted Sources
Untrusted Sources
The Google Chrome web store provides an official location for publishing extensions and
themes. (Screenshot courtesy of Google, a trademark of Google LLC.)
BROWSER SETTINGS
Each browser maintains its own settings that are accessed via its
Meatball (…) or Hamburger (☰) menu button. Alternatively, you can
open the internal URL, such as chrome://settings,
edge://settings , or about:preferences (Firefox). The
settings configure options such as startup and home pages, tab
behavior, and choice of search engine and search behavior.
Browsers also have advanced settings that are accessed via a URL
such as chrome://flags or about:config.
Password Manager
When you browse a site using an HTTPS URL, the browser displays
the information about the certificate in the address bar.
Browsing CompTIA’s home page in Mozilla’s Firefox browser. When the browser trusts the
certificate issued to www.comptia.org, it displays a lock icon and identifies the URL as HTTPS.
Select the lock icon to inspect the certificate for further verification. The site’s certificate was
issued by the public CA DigiCert, Inc. (Screenshot courtesy of CompTIA and Mozilla.)
If the certificate is valid and trusted, a padlock icon is shown. Select
the icon to view information about the certificate and the CA
guaranteeing it.
Mozilla Firefox’s trusted certificate store showing the DigiCert root certificates that are trusted
authorities. (Screenshot courtesy of Mozilla.)
BROWSER PRIVACY SETTINGS
Viewing cookies set by visiting comptia.org’s home page in Google’s Chrome browser.
(Screenshot courtesy of CompTIA and Google, a trademark of Google, LLC.)
Troubleshoot Workstation
Security Issues
Backdoors
Actual Keylogger—Windows software that can run in the background to monitor different
kinds of computer activity (opening and closing programs, browsing websites, recording
keystrokes, and capturing screenshots). (Screenshot courtesy of actualkeylogger.com)
Rootkits
Performance Symptoms
These sorts of issues are less likely to have other causes so you
should quarantine the system and investigate it closely.
While there are some critical exploits that allow malicious code to
execute without authorization, to infect a fully patched host
malware usually requires the user to explicitly install the product
and confirm the UAC consent prompt. However, the malware may
be able to generate something that looks like a Windows
notification without being fully installed. One technique is to
misuse the push notification system that allows a website to send
messages to a device or app. The notification will be designed to
trick or frighten the user into installing the malware by displaying a
fake virus alert, for example. A notification may also link to a site
that has a high chance of performing a drive-by download on an
unpatched host.
Redirection
Redirection is where the user tries to open one page but gets sent
to another. Often this may imitate the target page. In adware, this
is just a blunt means of driving traffic through a site, but spyware
may exploit it to capture authentication details.
Certificate Warnings
Microsoft’s Security Intelligence knowledge base can be used to obtain additional information
about threats discovered by Windows Defender Antivirus. You can use this information to
determine indicators for manual verification, the impact of infection, and likelihood of other
systems being compromised. (Screenshot courtesy of Microsoft.)
INFECTED SYSTEMS
QUARANTINE
While there were differences in the past, the terms antivirus and
anti-malware are synonymous. Almost every antivirus product
protects against a broad range of virus, worm, fileless malware,
Trojan, rootkit, ransomware, spyware, and cryptominer threats.
Recovery Mode
OS Reinstallation
Once a system has been cleaned, you need to take the appropriate
steps to prevent reinfection.
3. Early in the day, a user called the help desk saying that
his computer is running slowly and freezing up. Shortly
after this user called, other help desk technicians who
overheard your call also received calls from users who
report similar symptoms. Is this likely to be a malware
infection?
Summary
You should be able to configure workstation and Windows OS
settings to meet best practices for security; install and configure
secure browsers; and detect, remove, and prevent malware using
the appropriate tools and best practice procedures.
Supporting Mobile
Software
LESSON INTRODUCTION
LESSON OBJECTIVES
Configure Mobile OS
Security
Patching/OS Updates
Antivirus/Anti-malware Apps
The Google Play store has a Play Protect feature that is enabled by default. This provides built-
in malware scanning and threat detection. (Screenshot courtesy of Google Play Store, a
trademark of Google LLC.)
Firewall Apps
There are also firewall apps for mobile devices. These can be used
to monitor app activity and prevent connections to ports or IP
addresses. One issue for firewalls is that they must be able to
control other apps and therefore logically work at a higher
permission level (root). Installing an app with root access is
challenging, however. “No-root” firewalls work by creating a virtual
private network (VPN) and then controlling app access to the VPN.
ENTERPRISE MOBILITY
MANAGEMENT
Mobile devices have replaced computers for many email and daily
management tasks and are integral to accessing many other
business processes and cloud-based applications. A mobile device
deployment model describes the way employees are provided with
mobile devices and applications.
Device Encryption
All but the earliest versions of mobile device operating systems for
smartphones and tablets provide some type of default encryption.
In iOS, there are various levels of encryption.
● All user data on the device is always encrypted, but the key is
stored on the device. This is primarily used as a means of
wiping the device. The OS just needs to delete the key to
make the data inaccessible rather than wiping each storage
location.
● Email data and any apps using the “Data Protection” option
are subject to a second round of encryption using a key
derived from and protected by the user’s credential. This
provides security for data if the device is stolen. Not all user
data is encrypted using the “Data Protection” option; contacts,
SMS messages, and pictures are not, for example.
Security Concerns
Troubleshoot Mobile OS
and App Software
The troubleshooting techniques you use for PCs and laptops are
similar to the ones needed for resolving issues on mobile-device
operating systems and applications. One difference is that apps,
operating system, and hardware are tightly integrated in mobile
devices. You may need to troubleshoot all three components to
determine which one is causing the issue.
MOBILE DEVICE
TROUBLESHOOTING TOOLS
Access the iOS Control Center (left) by swiping from the top-right and Android notification
drawer by swiping from the top. These contain shortcuts for enabling or disabling radios and
other features. (Screenshots reprinted with permission from Apple Inc., and Android platform,
a trademark of Google LLC.)
Reboot
Factory Reset
A factory reset removes all user data, apps, and settings. The
device will either have to be manually reconfigured with a new user
account and reloaded apps or restored from a backup
configuration. When you are performing a factory reset, ensure
that the device has a full battery charge or is connected to an
external power source.
OS Fails to Update
If you can rule out hardware causes such as throttling due to high
temperature or low battery charge, a device that is slow to
respond can be an indication of resources being inadequate (too
many open apps) or badly written apps that overutilize memory or
other resources. A reboot will usually fix the problem in the short
term. If the problem is persistent, either try to identify whether the
problem is linked to running a particular app or try freeing space
by removing data or apps.
You should also consider any recently installed apps. Having many
apps that run some sort of monitoring or connectivity check in the
background or apps that display real-time content in a home
screen widget will impact performance. You can use Battery
settings to investigate which apps are consuming most resources.
Alternatively, a third-party system monitor app could be installed
to report utilization information.
In iOS (left), enabling the rotation lock from Control Center prevents the device from
autorotating. The screenshot shows that the lock is currently unhighlighted (off). In Android
(right), enabling the autorotate button allows the screen to reorient automatically, while
disabling it locks the orientation. The screenshot shows a device with autorotate highlighted
(enabled). (Screenshots reprinted with permission from Apple Inc., and Android platform, a
trademark of Google LLC.)
2. Check that the user is not touching any part of the screen as
this will prevent rotation.
3. Consider that some apps can only be used in a single
orientation. These might also interfere with other apps, so try
closing apps via the task list. To show the task list:
If this doesn’t work, you can try clearing the app cache either from
within the app or (in Android) using the Clear Cache option under
App info.
The user’s account lists previously used and purchased apps, even
when they are removed from a device. Reinstall the app via the
store.
Configuration Issues
AirDrop is an iOS feature that allows file transfer between iOS and
macOS devices over a Bluetooth connection. The sender must be
listed in the recipient’s contacts list, or AirDrop must be configured
to receive files from everyone. Check that the feature is enabled
and correctly configured under Settings > General > AirDrop , and
ensure that the devices are within range for a Bluetooth link.
Troubleshoot Mobile OS
and App Security
In iOS and Android, the user account created during setup is able
to install apps and configure settings, but it is restricted from
making any system-level changes. Users who want to avoid the
restrictions that some OS vendors, handset OEMs, and telecom
providers put on the devices must use some type of privilege
escalation:
App Spoofing
In Android, each app has an Install unknown apps toggle. For example, enabling the toggle
shown here would allow the Firefox browser to download and install an app. (Screenshot
courtesy of Android platform, a trademark of Google LLC and
Mozilla.)
Antivirus software for mobile OSs is available but is not always that
reliable. You should be alert to general symptoms of malware.
Many of these symptoms are like those experienced on a PC OS:
Managing location services in iOS (left) and Android. (Screenshots reprinted with permission
from Apple Inc., and Android platform, a trademark of Google LLC.)
Summary
You should be able to explain common methods for securing
mobile and embedded devices and troubleshoot common and
security-related mobile OS and app issues.
LESSON INTRODUCTION
This lesson will help you to identify the technologies and best
practices that underpin these important procedures.
LESSON OBJECTIVES
You also need to define credentials for the remote host. To specify
a domain account, use the format Domain \ Username . To use a
local account, use either .\ Username or Host\Username .
RDP authentication and session data is always encrypted. This
means that a malicious user with access to the same network
cannot intercept credentials or interfere or capture anything
transmitted during the session.
There are versions of the mstsc client software for Linux, macOS,
iOS, and Android, so you can use devices running those operating
systems to connect to an RDP server running on a Windows
machine.
Use the Select users link to define which accounts are permitted
to connect remotely. Users in the local administrators group are
allowed to connect by default. You can select users from the local
accounts database or from the domain that the machine is joined
to.
Under Advanced settings, you can choose between allowing older
RDP clients to connect and requiring RDP clients that support
Network Level Authentication (NLA). NLA protects the RDP server
against denial of service attacks. Without NLA, the system
configures a desktop before the user logs on. A malicious user can
create multiple pending connections to try to crash the system.
NLA authenticates the user before committing any resources to the
session.
The Remote Desktop server runs on TCP port 3389 by default but
can be changed to another port.
There are two general classes of tool that provide this type of
enterprise monitoring and remote access:
Screen-sharing Software
Some tools require the app to be installed locally, while others can
be executed non-persistently. The user can grant access to an
assistant or technician by giving them a PIN code generated by the
local software installation.
Users must be made aware of the potential for threat actors to use
social engineering to persuade them to allow access. When used in
a corporate environment, there should be a specific out-of-band
verification method for users to confirm they are being contacted
by an authorized technician.
Video-conferencing Software
Most video-conferencing or web-conferencing software, such as
Microsoft Teams or Zoom, includes a screen-share client, and some
also allow participants to be granted control of the share. The
share can be configured as a single window or the whole desktop.
The share will have the privileges of the signed-in user, so these
apps cannot be used to perform any administrator-level
configuration, but they are useful for demonstrating a task to a
user or reproducing a support issue by observing the user.
If you need to restore a file or folder, you can either use the
Previous Versions tab in the object’s Properties dialog box or use
the File History applet to restore multiple files.
Backup Chains
The requirements for backup frequency and retention must be
managed against the capacity of the backup media and the time it
takes to complete a backup job. These requirements are managed
by using different types of jobs in a backup chain . The main types
of backups are full only, full with incremental, and full with
differential:
● “Full only” means that the backup job produces a file that
contains all the data from the source. This means that the
backup file is nominally the same size as the source, though it
can be reduced via compression. A full backup has the
highest storage and time requirements but has the least
recovery complexity as only a single file is required.
● “Full with incremental” means that the chain starts with a full
backup and then runs incremental jobs that select only new
files and files modified since the previous job. An incremental
job has the lowest time and storage requirement. However,
this type of chain has the most recovery complexity as it can
involve two or more jobs, each of which might be stored on
different media.
● “Full with differential “means that the chain starts with a full
backup and then runs differential jobs that select new files
and files modified since the original full job. A differential
chain has moderate time and storage requirements and
slightly less recovery complexity than incremental as it
requires a maximum of two jobs (the full backup plus the
differential job).
Backup Job
Time and Recovery Archive
Type Data Selection
Storage Complexity Attribute
Requirement
Synthetic Backup
The 3-2-1 backup rule is a best-practice maxim that you can apply
to your backup procedures to verify that you are implementing a
solution that can mitigate the widest possible range of disaster
scenarios. It states that you should have three copies of your data
(including the production copy), across two media types, with one
copy held offline and off site.
BACKUP TESTING AND
RECOVERY BEST PRACTICES
When you design a backup scheme, test it to make sure it’s reliable.
To test the backup:
While you hope that security and data handling policies will be
sufficient to protect your computer systems and networks, you also
need to consider the situations where those protections fail. To
cope with failures of security policy, or attempted breaches of
policy, organizations need well-rehearsed incident response
procedures to investigate and remediate the breach. You will often
be involved in identifying and reporting security incidents and
potentially in assisting with investigations and evidence gathering.
It is important that you understand some of the general principles
of effective incident response and forensic investigation
procedures.
REGULATED DATA
CLASSIFICATION
Healthcare Data
Another issue for regulated data is its retention on both file and
database servers and in backup files:
Prohibited Content
Open-source Licenses
Digital music and video are often subject to copy protection and
digital rights management (DRM) . When you purchase music or
video online, the vendor may license the file for use on a restricted
number of devices. You generally need to use your account with
the vendor to authorize and deauthorize devices when they
change. Most DRM systems have been defeated by determined
attackers, and consequently there is plenty of content circulating
with DRM security removed. From an enterprise’s point of view,
this is prohibited content, and it needs monitoring systems to
ensure that its computers are not hosting pirated content files.
INCIDENT RESPONSE
Chain of Custody
It is vital that the evidence collected at the crime scene conforms to
a valid timeline. Digital information is susceptible to tampering, so
access to the evidence must be tightly controlled. Once evidence
has been bagged, it must not subsequently be handled or
inspected, except in controlled circumstances.
Most disk vendors supply low level format tools to reset a disk to
its factory condition. Most of these tools will now incorporate some
type of sanitize function. You must verify the specific capability of
each disk model, but the following functions are typical:
You can develop a script in any basic text editor, but using an
editor with script support is more productive. Script support means
the editor can parse the syntax of the script and highlight elements
of it appropriately. For complex scripts and programming
languages, you might use an integrated development environment
(IDE). This will provide autocomplete features to help you write and
edit code and debugging tools to help identify whether the script or
program is executing correctly.
#!/bin/bash
Remember that in Linux, the script file must have the execute
permission set to run. Execute can be set as a permission for the
user, group, or world (everyone). If a PATH variable to the script
has not been configured, execute it from the working directory by
preceding the filename with ./ (for example, ./hello.sh ), or
use the full path.
Setting execute permission for the user and running the script.
BASIC SCRIPT CONSTRUCTS
Comments
#!/bin/bash
Variables
A variable is a label for some value that can change as the script
executes. For example, you might assign the variable FirstName
to a stored value that contains a user’s first name. Variables are
usually declared, defined as a particular data type (such as text
string or number), and given an initial value at the start of the
routine in which they are used.
Branches
#!/bin/bash
if [ -z “$1” ]
then
else
fi
Loops
#!/bin/bash
for i in
do
done
#!/bin/bash
do
done
echo “192.168.1.$1 up”
The condition executes the ping command and tests the result.
When a reply is received, ping returns true. The &>/dev/null
part stops the usual ping output from being written to the terminal
by redirecting it to a null device.
Operators
Symbol Switch
Usage
Notation Notation
Windows PowerShell
VBScript
Batch Files
JavaScript
Python
Python script files are identified by the .PY extension. When using
CPython in Windows, there is a console interpreter (python.exe)
and a windowed interpreter (pythonw.exe). The extension .PYW is
associated with pythonw.exe.
Python Integrated Development and Learning Environment (IDLE). As well as a terminal and
script editor, the environment has a debugger. You can use this to step through statements
and examine the value of variables.
Restarting Machines
Linux is famous for its ability to run for any period without
requiring a restart. However, should the need arise, the command
to restart the host in Bash is shutdown -r
If (Test-Path L:) {
Get-PSdrive L | Remove-PSDrive
Installation of Applications
C:\David\Downloads\setup.exe /S
/desktopicon=yes
msiexec C:\David\Downloads\install.msi
/qn
In Linux, scripts are often used to compile apps from source code.
You could also use a script to automate APT or YUM package
management.
Initiating Updates
In Linux, you can call apt-get/ apt or yum from your Bash
script. The -y option can be used to suppress confirmation
messages.
Automated Backups
Malware Risks
./ping.sh 192.168.1.1
Summary
You should be able to use remote access, backup/recovery, data
destruction, and scripting tools and methods to provide
operational support and explain the importance of prohibited
content/activity and privacy, licensing, and policy concepts.
Implementing Operational
Procedures
LESSON INTRODUCTION
LESSON OBJECTIVES
Categories
Severity
Escalation Levels
The ticket owner is the person responsible for managing the ticket.
When escalating, ownership might be re-assigned or not. Whatever
system is used, it is critical to identify the current owner. The owner
must ensure that the ticket is progressed to meet any deadlines
and that the ticket requester is kept informed of status.
Incident Reports
Database Systems
Assigned Users
Risk Analysis
End-user Acceptance
As well as the technical implementation, the change plan must
account for end-user acceptance. It can be difficult for people to
adapt to new processes and easy for them to magnify minor
problems into major complaints of the “It worked before” kind.
There are three principal strategies for mitigating these risks:
● User information
● Device information
● Problem description/Progress notes/Problem
resolution
● Categories
● Escalation levels
Use Proper
Communication
Techniques
From the point of first contact, the support process must reassure
customers that their inquiry will be handled efficiently. If the
customer has already encountered a problem with a product, to
find that the support process is also faulty will double their poor
impression of your company.
Proper Documentation
Follow Up
If you have resolved the ticket and tested that the system is
operating normally again, you should give the customer a general
indication of what caused the issue and what you did to fix it along
with assurance that the problem is now fixed and unlikely to
reoccur. Upon leaving or ending the call, thank the customer for
their time and assistance and show that you have appreciated the
chance to solve the issue.
Respect means that you treat others (and their property) as you
would like to be treated. Respect is one of the hallmarks of
professionalism.
Be On Time
Avoid Distractions
A distraction is anything that interrupts you from the task of
resolving the ticket. Other than a genuinely critical incident taking
priority, do not allow interruptions when you are working at a
customer’s site. Do not take calls from colleagues unless they are
work-related and urgent. Other than a genuine family emergency,
do not take personal calls or texts. Do not browse websites, play
games, or respond to posts on social media.
While you do not have to speak very formally, avoid being over-
familiar with customers. Do not use slang phrases and do not use
any language that may cause any sort of offense. For example, you
should greet a customer by saying “Hello” or “Good morning”
rather than “Hey!”
Cultural Sensitivity
You must listen carefully to what is being said to you; it will give
you clues to the customer’s technical level, enabling you to pace
and adapt your replies accordingly.
Active Listening
Restating the issue and using a closed question allows the agent to
start working through a series of symptoms to try to diagnose the
problem.
Everyone has bad days when they feel the need to get some
difficult situation off their chest. Find a colleague for a private face-
to-face chat, but under no circumstances should you ever disclose
these types of experiences via social media outlets. Remember that
anything posted to social media is very hard to withdraw and can
cause unpredictable reactions.
Review Activity: Proper
Communication
Techniques
Fuses
Equipment Grounding
Electrical equipment must be grounded . If there is a fault that
causes metal parts in the equipment to become live, a ground
provides a path of least resistance for the electrical current to flow
away harmlessly. Devices such as PCs and printers are connected
to the building ground via the power plug. However, the large
metal equipment racks often used to house servers and network
equipment must also be grounded. Do not disconnect the ground
wire. If it must be removed, make sure it is replaced by a
professional electrician.
You should also ensure that the electricity supply is turned off. This
should happen automatically (the fuses for the circuit should trip
but may have failed), but make sure you know the location of the
power master switches for a building.
OTHER SAFETY HAZARD
MITIGATIONS
Trip Hazards
Lifting Techniques
Lifting a heavy object in the wrong way can damage your back or
cause muscle strains and ligament damage. You may also drop the
object and injure yourself or damage the object. When you need to
lift or carry items, be aware of the maximum safe lifting weight as
well as any restrictions and guidance set out in your job description
or site safety handbook. To lift a heavy object safely:
1. Plant your feet around the object with one foot slightly
toward the direction in which you are going to move.
2. Bend your knees to reach the object while keeping your back
as straight and comfortable as possible and your chin up.
3. Find a firm grip on the object, and then lift smoothly by
straightening your legs—do not jerk the object up.
4. Carry the object while keeping your back straight.
5. To lower an object, reverse the lifting process; keep your chin
up and bend at the knees. Take care not to trap your fingers
or to lower the object onto your feet.
Dust Cleanup
Dust is drawn into the computer via ventilation holes. Over time,
the dust can form a thick layer over components, heat sinks, fan
blades, and ventilation slots, preventing effective heat dissipation.
It can clog up peripherals such as keyboards and mice. Dust and
smears can make the display hard to read. To perform dust
cleanup:
The human body is mostly water and so does not generate or store
static electricity very well. Unfortunately, our clothes are often
made of synthetic materials, such as nylon and polyester, which act
as good generators of static electricity and provide insulating layers
that allow charges to accumulate, especially when walking over
carpet. Humidity and climate also affect the likelihood of ESD. The
risk increases during dry, cool conditions when humidity is low. In
humid conditions, the residual charge can bleed into the
environment before it can increase sufficiently to be harmful to
electrical components.
Electrostatic Discharge (ESD) wrist strap on ESD mat. (Image by Audrius Merfeldas
©123RF.com.)
Battery Backups
Summary
You should be able to implement documentation, change
management and professional communication best practices, and
use common safety and environmental controls.
2.0 Networking
3.0 Hardware
Upgrade paths
Lesson 12, Topic B
In-place upgrade
Additional tools
System Information (msinfo32.exe) Lesson 11, Topic B
Resource Monitor (resmon.exe) Lesson 11, Topic B
System Configuration (msconfig.exe) Lesson 11, Topic B
Disk Cleanup (cleanmgr.exe) Lesson 11, Topic A
Disk Defragment (dfrgui.exe) Lesson 11, Topic A
Registry Editor (regedit.exe) Lesson 11, Topic A
2.0 Security
Inheritance
3.3 Given a scenario, use best practice procedures for malware. Covered in
Material safety data sheet (MSDS)/documentation for handling Lesson 20, Topic C
and disposal
Proper battery disposal
Proper toner disposal
Proper disposal of other devices and assets
Use proper language and avoid jargon, acronyms, and slang, Lesson 20, Topic B
when applicable
Actively listen, take notes, and avoid interrupting the customer Lesson 20, Topic B
Set and meet expectations/time line and communicate status Lesson 20, Topic B
with the customer
Offer repair/replacement options, as needed
Provide proper documentation on the services provided
Follow up with customer/user at a later date to verify
satisfaction
Deal appropriately with customers’ confidential and private Lesson 20, Topic B
materials
Located on a computer, desktop, printer, etc.
.ps1
.vbs
.sh
.js
.py
Restarting machines
Remapping network drives
Installation of applications
Automated backups
Gathering of information/data
Initiating updates
4.8 Identify the basics of scripting. Covered in
CORE 1
binary Notational system with two values per digit (zero and one).
Computers process code in binary because the transistors in its
CPU and memory components also have two states (off and on).
carriage belt Inkjet print device component that moves the print
head over the paper.
fiber optic cable Network cable type that uses light signals as the
basis for data transmission. Infrared light pulses are transmitted
down the glass core of the fiber. The cladding that surrounds this
core reflects light back to ensure transmission efficiency. Two main
categories of fiber are available; multi-mode, which uses cheaper,
shorter wavelength LEDs or VCSEL diodes, or single-mode, which
uses more expensive, longer wavelength laser diodes. At the
receiving end of the cable, light-sensitive diodes re-convert the light
pulse into an electrical signal. Fiber optic cable is immune to
eavesdropping and EMI, has low attenuation, supports rates of 10
Gb/s+, and is light and compact.
hard disk drive (HDD) Mass storage device that uses mechanical
platters with a magnetic coating that are spun under disk heads
that can read and write to locations on each platter (sectors).
hybrid cloud Cloud deployment that uses both private and public
elements.
injector A device that can supply Power over Ethernet (PoE) if the
Ethernet switch ports do not support it.
Intel Intel processors were used in the first IBM PCs, and the
company’s CPUs and chipsets continue to dominate the PC and
laptop market.
land grid array (LGA) CPU socket form factor used predominantly
by Intel where connector pins are located on the socket.
maintenance kit On a laser printer, the fuser unit (the part that
fuses toner onto the paper) needs replacing according to the
maintenance kit schedule. A maintenance kit also includes new
pickup, feed, and separation rollers. It may also include transfer
components (roller or belt), or these may be replaced on a
different schedule, depending on the printer model.
multicore CPU design that puts two chips onto the same package.
Most CPUs are multicore (more than two cores).
organic LED (OLED) Type of flat panel display where each pixel is
implemented as an LED, removing the need for a separate
backlight.
output voltage Direct current (DC) 3.3 VDC, 5 VDC, and 12 VDC
power supplied over PSU cables to computer components.
PCI Express (PCIe) Internal expansion bus that uses serial point-to-
point communications between devices. Each link can comprise
one or more lanes (x1, x2, x4, x8, x12, x16, or x32). Each lane
supports a full-duplex transfer rate of 250 MB/s (v1.0) up to about
4 GB/s (v5.0).
pin grid array (PGA) CPU socket form factor used predominantly
by AMD where connector pins are located on the CPU package.
real-time clock (RTC) Part of the system chipset that keeps track
of the date and time. The RTC is powered by a battery, so the PC
keeps track of the time even when it is powered down. If the
computer starts losing time, it is a sign that the battery is failing.
secured print Feature that holds print jobs until the user
authenticates directly with the print device using a PIN or smart
badge.
serial ATA (SATA) Serial ATA is the most widely used interface for
hard disks on desktop and laptop computers. It uses a 7-pin data
connector with one device per port. There are three SATA
standards specifying bandwidths of 1.5 Gb/s, 3 Gb/s, and 6 Gb/s
respectively. SATA drives also use a new 15-pin power connector,
though adapters for the old style 4-pin Molex connectors are
available. External drives are also supported via the eSATA
interface.
single-mode fiber (SMF) Fiber optic cable type that uses laser
diodes and narrow core construction to support high bandwidths
over distances of more than five kilometers.
test access port (TAP) Hardware device inserted into a cable run
to copy frames for analysis.
thermal paste/pad Cooling substance applied between a
component and heat sink to optimize heat transfer.
thermal printer Type of printer that uses a heated print head and
specially treated paper to form the image. Most direct thermal
printers are handheld devices used for printing labels or receipts.
Wi-Fi Brand name for the IEEE 802.11 standards that can be used
to implement a wireless local area network (WLAN).
CORE 2
3-2-1 backup rule Best practice maxim stating that at any given
time there should be at least three copies of data stored on two
media types, with one copy held off site.
BAT Extension for the batch file format that is used to execute a
series of Windows CMD shell commands.
BIOS/UEFI password Passwords set in system firmware to prevent
unauthorized booting of a computer (user password) or changes to
system setup (supervisor password).
boot method (OS setup) Device used to start the setup program
and hold source files for installing or upgrading an OS.
boot sector virus Malicious code inserted into the boot sector
code or partition table of a storage device that attempts to execute
when the device is attached.
Devices and Printers Control Panel app for using and configuring
attached hardware.
differential backup Job type in which all selected files that have
changed since the last full backup are backed up.
Disk Utility macOS tool for disk and file system support tasks.
evil twin Wireless access point that deceives users into believing
that it is a legitimate network access point.
ext3 Standard Linux file system that includes journaling and has
since been replaced with ext4.
ext4 One of the default file systems in modern Linux versions that
supports journaling and large volumes.
file system Structure for file data indexing and storage created by
a process of formatting a partition that allows an OS to make use
of a mass storage device, such as an HDD, SSD, or thumb drive.
full backup Job type in which all selected files, regardless of prior
state, are backed up.
home folder Default local or network folder for users to save data
files to.
incremental backup Job type in which all selected files that have
changed since the last full or incremental backup (whichever was
most recent) are backed up.
low level format Using a vendor tool to fully erase storage media
before recycling or repurposing, minimizing the risk of leaving
persistent data remnants.
password manager Software that can suggest and store site and
app passwords to reduce risks from poor user choices and
behavior. Most browsers have a built-in password manager.
power users One of the default Windows group accounts. Its use
is deprecated, but it is still included with Windows to support
legacy applications.
recycle bin When files are deleted from a local hard disk, they are
stored in the Recycle Bin. They can be recovered from here if so
desired.
Remote Disc macOS tool for sharing an optical drive over the
network.
SH Extension for a Linux shell script file format. The shebang in the
first line of the script identifies the shell type (Bash, for instance).
smart card Security device similar to a credit card that can store
authentication information, such as a user’s private key, on an
embedded cryptoprocessor.
startup Apps and scripts set to run when the computer starts or
when the user signs in. Startup items can be configured as
shortcuts, registry entries, or Task Scheduler triggers.
Yes. The fan system is designed to draw cool air across the
motherboard and blow out warm air. Large holes in the chassis
disrupt this air flow. Also, dust will be able to settle on the system
components more easily. A blanking plate covers the empty slot in
the case.
10 Gbps.
One.
The image shows a 15-pin D-shell type video graphics array (VGA)
port and a beveled high-definition multimedia interface (HDMI)
port. The port in between them is an RJ45 network port, and the
two ports on the right are USB Type A ports.
The port on the left is digital visual interface (DVI). The pattern of
pins identifies it specifically as dual link DVI-I, which supports both
digital and analog signaling. The port on the right is a DisplayPort
interface.
You must check that the voltage selector is set to the correct
voltage or, if there is no selector, that the PSU is suitable for the
voltage used by the building power circuit.
3. One of the PCs has a faulty CPU, and one has a faulty
power supply. You can use the CPU from one machine in
the other. You have opened the case and taken antistatic
precautions. What steps must you perform to access the
CPU?
False. M.2 is a physical form factor and can support both SATA and
NVMe interfaces.
RAID 5 (striping with parity). RAID 0 is not fault tolerant. RAID 1 and
RAID 10 require an even number of disks.
360 GB.
RAID 10 requires at least four disks (two mirrored pairs) and comes
with a 50% capacity overhead, so the volume will only be half the
total disk capacity.
A CPU tends to repeat the same routines and access the same data
over and over again. If these routines are stored in fast cache RAM,
they can be accessed more quickly than instructions and data
stored in system memory.
No. The CPU models must be identical. If the CPUs are not
identical, the system is unlikely to boot. Even if the system boots, it
is not likely to operate reliably.
No. You must verify that the CPU model supports virtualization
extensions.
You must check that pin 1 is aligned properly and that the pins on
the package are aligned with the holes in the socket. Otherwise,
you risk damaging the pins when the locking lever is secured.
Review Activity:
Troubleshooting
Methodology
You should check that data on the PC has been backed up. You
should always verify that you have a backup before beginning any
troubleshooting activities.
It is most likely that one or more power connectors have not been
reconnected. Check the P1 motherboard connector, a 4-pin CPU
connector, and all necessary SATA or Molex device connectors.
Also, the cable connecting the power button to a motherboard
header could have been disconnected.
Use the vendor’s system setup guide to verify that the correct
memory type was installed on the system and in the correct
configuration (consider whether dual-channel memory was
installed in the correct slots). Check that the new memory module
is seated properly in its slot. Try swapping memory around in the
memory slots.
3. You are trying to install Windows from the setup disc, but
the computer will not boot from the DVD. What should
you do?
Check that the boot order in system setup is set correctly. If the
boot order is correct, check that the disc is not dirty or scratched. If
the disc loads in another computer, check that the optical drive
data and power cables are connected.
4. Following a power cut, a user reports that their computer
will not boot. The message “BCD missing” is shown on the
screen. The computer does not store data that needs to
be backed up. What is the best first step to try to resolve
the issue?
Use a system recovery disk to try to repair the disk drive’s boot
information.
A degraded volume is still working but has lost one of its disks. In
most RAID configurations, another disk failure would cause the
volume to fail, so you should add a new disk as soon as possible
(though do note that rebuilding the array will reduce performance).
Not necessarily. Hard disks do make noises, but they are not all
indicators of a problem. Question the user to find out what sort of
noises are occurring or inspect the system yourself.
Review Activity: System
and Display Issues
False. This is likely to damage the fans and draw more dust into the
case. It will also cause a lot of excess noise. To prevent overheating,
the PC should be installed to a suitable location (away from direct
sunlight and radiators) and cleaned and maintained to a schedule.
Replace the cable with a known good one. If this does not solve the
problem, suspect an issue with the monitor. As the PC was used
with no issues with another monitor, there is not likely to be an
issue with the video card.
Review Activity: Network
Types
Yes. The patch panel terminates cabling, but it does not establish
any connections between the cable segments. You must install a
networking appliance to act as a concentrator and connect the
cable segments. On modern networks, this means installing a
switch and cabling it to the patch panel ports using RJ45 patch
cords.
Cat5e will meet the requirement and will cost the least. Cat 6 offers
better performance without adding too much cost. Cat 6A would
be the best choice for supporting future requirements, but it is
likely to cost more than the customer is budgeting for.
The cable is plenum cable, rated for use in plenum spaces (building
voids used with HVAC systems).
No. First, a client can only use one radio at a time and so cannot
connect simultaneously to the 2.4 GHZ and 5 GHz bands. Secondl,
802.11ac works only at 5 GHz; 802.11ac access points use the 2.4
GHz band to support 802.11b/g/n clients. The 802.11ac standard
can increase bandwidth by using multiple input output (MIMO)
antenna configurations to allocate more streams, such as 2x2 or
3x3.
No. You need to configure the service set identifier (SSID), unless
you want to rely on the default value. The SSID is a name for users
to recognize the network by. The basic SSID (BSSID) is the MAC
address of the access point’s radio. As this is coded into the device
firmware, it does not need to be configured. Stations use the BSSID
to send frames to the access point.
A subnet mask field uses dotted decimal format. The /16 network
prefix means that the first 16 bits in the mask are set to one:
11111111 11111111 00000000 00000000. A whole octet of ones
converts to 255 in decimal. Therefore, the dotted decimal mask is
255.255.0.0.
● 52.165.16.254
● 192.168.100.52
● 169.254.1.121
● 172.30.100.32
● 224.100.100.1
The WAN interface of the router must use an IPv4 address from a
valid public range, so 52.165.16.254 is the only one it could be:
172.30.100.32 and 192.168.100.52 are in the class B and class C
private ranges, 169.254.1.121 is in the range reserved for APIPA,
and 224.100.100.1 is outside the range of valid public addresses (it
is part of class D, which is used for a type of addressing called
“multicasting”).
True. In IPv6, the host ID portion of the address is always the last
64 bits. The network prefix length is used to determine which
network a host is on, but a mask is not required.
Review Activity: Protocols
and Ports
False. The server application is identified by one port, but the client
must also assign its own port to track the connection.
False. The Domain Name System (DNS) uses root servers at the top
of the hierarchy. The root is represented by a trailing dot at the end
of a fully qualified domain name (FQDN), though this can very
commonly be omitted in ordinary usage.
An IPv6 address.
Either TCP port 993 (IMAPS) or 995 (POP3S), depending on the mail
access protocol in use (IMAP or POP). These are the default ports
for secure connections. Unsecure default ports are TCP port 143
and TCP port 110. Port 25 (SMTP) is used to send mail between
servers and not to access messages stored on a server. Port 587 is
often used by a client to submit messages for delivery by an SMTP
server.
A load balancer.
Metered utilization.
For Apple devices, the Lightning port. For Android, it will be USB-C.
Just select the provider then enter the email address. If the account
is detected, you will be prompted for the password.
The fixed drive, system memory (RAM), and plug-in wireless card
will be the easiest upgradable components to install. If items need
repairing, the battery, touchpad, and the keyboard should be
straightforward to replace, if you can obtain compatible parts.
This type of flat data connector is secured by a latch. Pop the latch
up before trying to remove the cable.
Review Activity: Mobile
Device Issues
Allow the print device to acclimate for a few hours after unboxing
to avoid risks from condensation.
The print device’s IP address or host name. You might note that
vendor utilities can search for a connected device on the local
network, so “None” could also be a correct answer.
Remove the packing strips. The printer should also be turned off,
and the old cartridge should be removed and placed into a sealed
bag for recycling.
The main component is a new fuser assembly. The kit will also
usually contain a transfer/secondary charge roller plus paper
transport rollers for each tray (pickup rollers and a new separation
pad).
Open the printer and locate the label that came off the backing.
Remove the label, and if there is any sticky residue, clean it with
isopropyl alcohol (IPA) applied to a swab. Ensure the roll of labels is
properly loaded and that there are no loose labels that might come
loose again.
Print out a test page to see if you can reproduce the problem the
user reported. If you see the same problem as reported by the
user, identify the print defect, based on the type of printer, to
resolve the problem. Document the steps you took to resolve the
problem.
The paper might not be loaded squarely, there might be too much
paper loaded into the tray, or the paper is creased or dirty.
It leaves black stripes on the paper. If the roller does not apply the
correct charge evenly to the drum, toner is attracted to the place
where the charging failed, creating a black stripe all the way down
the page.
Try using the printer’s built-in cleaning cycle and then replacing the
ink cartridge. If these do not work, try using an aftermarket
cleaning product. Try using the printer properties sheet to check
for print head alignment, color settings, and other settings.
Yes, this can be done via the Accounts settings app. The legacy
User Accounts applet in Control Panel can no longer be used to
add accounts.
Via the App permissions section under Privacy settings. You might
also note that most browser software can be configured to only
allow location information on a per-site basis.
Open the Settings app, and then select System. Select the About
section, and read the text next to Edition under the Windows
specifications heading.
Use the Sound settings app or Control Panel applet to check the
volume setting and that the headset is configured as the input and
output device. If the headset is not listed, check the USB or
Bluetooth connection.
4. You are assisting a laptop user. While the user was away
from their desk, the laptop powered off. The user was in
the middle of working on a file and forgot to save
changes. Can you reassure the user and advise on the
best course of action?
When a computer goes into a power-saving mode, it will either
maintain a small amount of power to the memory modules or
write the contents of memory to a hibernation file on disk.
Consequently, the user should be able to start the laptop again,
and the desktop will resume with the open file still there. You
should advise the customer to save changes to files regularly,
however.
Review Activity:
Management Consoles
Open Device Manager from the WinX menu, Instant Search, or the
Computer Management console. Expand Keyboards, then right-
click the device and select Properties. On the Driver tab, select Roll
Back Driver.
The icon indicates that the device has been disabled. It could be
that there was a fault, or there may be a network configuration or
security reason for disabling the adapter. In this sort of situation,
use incident logs and device documentation to establish the reason
behind the configuration change.
False. While solid state drives (SSDs) and hard disk drives (HDDs)
have different mechanical and performance characteristics, it is
still necessary to run the Defragment and Optimize Drives
(dfrgui.exe) periodically to optimize performance.
5. In Windows, what is the difference between the boot
partition and the system partition?
The system partition contains the boot files; the boot partition
contains the system root (OS files). The boot partition is normally
assigned the drive letter C. The system partition is not normally
assigned a drive letter.
Review Activity:
Performance and
Troubleshooting Tools
Select the Physical Disk object, select the counter, and then select
the 0 C: instance. Counters that are useful for evaluating
performance include % Disk Time and Average Disk Queue Length.
No—it shows the system is using the pagefile intensively and could
benefit from more system RAM being installed.
Review Activity: Command-
line Tools
Yes, it is valid. It formats drive D with the exFAT file system by using
a quick format (does not scan for bad sectors). This will delete the
file table on the drive so existing data files can be overwritten—the
formatted drive will appear to be empty in Explorer. If there are
existing files that need to be preserved, they should be backed up
before running the format command.
Journaling means that the file system keeps a log of updates that it
can use to recover damaged data. The OS might also make use of
snapshot capability to maintain a file-version history or perform
continuous backups.
No. You must backup user data and settings first. A backup is
essential as a security precaution.
Try to end the application or the process using Task Manager, and
then contact the application vendor to find out why the problem is
occurring.
The user will be concerned about losing any unsaved work. Ask the
user to describe what he or she was doing at the time of the crash
to try to diagnose what might have caused it. Give the program a
few minutes to finish processing—check Task Manager for ongoing
disk activity. If the application does not start responding, check
autosave and temp folders for a recent copy of the file data. Use
Task Manager to end the process. Restart the application, and try
to open any file data you might have recovered. Check the log files
and online resources to try to diagnose the cause of the crash. If
the problem persists, consider solutions such as disabling add-ons
or reinstalling. Demonstrate to the user how to set up autosave (if
it is not already configured) and how to save regularly.
Boot using a recovery tool, such as the product disc, and attempt
startup repair and/or repair of the Windows installation using sfc
or Windows reset.
● IP: 192.168.1.1
● Mask: 255.255.255.0
● Gateway: 192.168.1.0
● DNS: 192.168.1.0
You must also input the fully qualified domain name (FQDN) or IP
address of the remote access VPN server.
Review Activity: Windows
Networking
ipconfig /renew
This is output from netstat. The -n switch has been used to show
ports in numeric format and the -o switch to show the PID of the
process that opened the port.
Review Activity: Windows
Security Settings
True.
ls -la
rm -r /home/jaime/junk
mv names.doc /mnt/usb
Read-only.
sudo
Review Activity: Features
of macOS
In the Status menu on the Menu bar, in the top-right of the screen,
or in the Network prefpane.
COMMAND+SPACEBAR.
The Finder.
Open the Mac App Store and select the Updates button.
Time Machine.
Review Activity: Attacks,
Threats, and
Vulnerabilities
This is an evil twin attack where the threat actor uses social
engineering techniques to persuade users to connect to an access
point that spoofs a legitimate guest network service.
That the browser address bar displays the lock icon to indicate that
the site uses a trusted certificate. This validates the site identity
and protects information submitted via the form from interception.
False. Incognito mode can prevent the use of cookies but cannot
conceal the user’s source IP address. You do not need to include
this in your answer, but the main way to conceal the source IP
address is to connect to sites via a virtual private network (VPN).
Review Activity:
Workstation Security
Issues
3. Early in the day, a user called the help desk saying that
his computer is running slowly and freezing up. Shortly
after this user called, other help desk technicians who
overheard your call also received calls from users who
report similar symptoms. Is this likely to be a malware
infection?
Check that the device has sufficient spare storage, and check for
updates. If you can’t identify a device-wide fault, test to see
whether the issue is associated with use of a single app.
Review Activity: Mobile OS
and App Security
It states that you should have three copies of your data across two
media types, with one copy held offline and offsite. The production
data counts as one copy.
You can perform a test restore and validate the files. You can run
an integrity check on the media by using, for example, chkdsk on a
hard drive used for backup. Backup software can often be
configured to perform an integrity check on each file during a
backup operation. You can also perform an audit of files included
in a backup against a list of source files to ensure that everything
has been included.
Review Activity: Data
Handling Best Practices
Who has had access to evidence collected from a crime scene and
where and how it has been stored.
.PS1 for PowerShell scripts, .VBS for VBScript, and .BAT for cmd
batch files.
You can use any type of loop to iterate through the items in a list or
collection, but a For loop is probably the simplest.
./ping.sh 192.168.1.1
While the risk is low, scanning activity could cause problems with
the target and possibly even crash it. Test the script in a sandbox
environment before deploying it. Security software might block the
operation of this script, and there is some risk from the script or its
output being misused. Make sure that use of the script and its
output are subject to access controls and that any system
reconfiguration is properly change-managed.
Review Activity: Best
Practice Documentation
● User information
● Device information
● Problem description/Progress notes/Problem
resolution
● Categories
● Escalation levels
Advise the customer that you will put him or her on hold while you
speak to someone else, or arrange to call the customer back.
False. The conductive path will occur through your fingers as you
touch electronic components. The stud in the wrist strap must
make contact with your skin to drain the charge.
The main concern is damaging your back. Lift slowly and use your
legs for power, not your back muscles.
Heat and direct sunlight, excessive dust and liquids, and very low
or high humidity. Equipment should also be installed so as not to
pose a topple or trip hazard.